Protecting Your Cloud Presence by Analyzing Network Activity

Logo
Presented by

Guy Raz,Prin Eng/ExtraHop;Kuldeep Beniwal IAM Architect, LendingClub; Richard Israelite Sr Dir,Addepar;Dunlap, Moderator

About this talk

Firewalls and endpoint agents only protect part of your risk surface. By leveraging several sources of network telemetry — including packets, flow logs, DNS logs, and more — security teams can take a multi-layered approach to visibility, threat detection, and investigation to defend cloud assets against advanced threats. Join (ISC)² and Extrahop on November 17 at 1:00 p.m. eastern / 10:00 a.m. pacific as we discuss Network Telemetry as a key component of an effective defense-in-depth strategy to enhance cloud security. We will explore best practices that enable your organization to identify indicators of compromise so you can investigate and respond to threats that successfully bypass perimeter and endpoint defenses.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (192)
Subscribers (136217)
ISC2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.