Hi [[ session.user.profile.firstName ]]

Automating Advanced Threat Detection for Speedier Identification of Next-generat

The process of detecting advanced malware threats is growing in complexity and in the sources of data and points to be analyzed. Certain tactics are well known and practiced, i.e. DNS fast fluxing, whitelisting/blacklisting, email tracking, pdf and image sandboxing, etc. The combination of these tactics plus more complicated behavior analysis needs to be automated in order to stay ahead of the bad actors as they quickly evolve. We will discuss these challenges and offer some ideas for solving the analysis automation in a world of big data – saving time and human resources in the fight against sophisticated hackers and rapidly emerging threats.
Recorded Dec 3 2013 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Deerman, Head of Cybersecurity Engineering, ISC8
Presentation preview: Automating Advanced Threat Detection for Speedier Identification of Next-generat

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Automating Advanced Threat Detection for Speedier Identification of Next-generat Recorded: Dec 3 2013 36 mins
    Jim Deerman, Head of Cybersecurity Engineering, ISC8
    The process of detecting advanced malware threats is growing in complexity and in the sources of data and points to be analyzed. Certain tactics are well known and practiced, i.e. DNS fast fluxing, whitelisting/blacklisting, email tracking, pdf and image sandboxing, etc. The combination of these tactics plus more complicated behavior analysis needs to be automated in order to stay ahead of the bad actors as they quickly evolve. We will discuss these challenges and offer some ideas for solving the analysis automation in a world of big data – saving time and human resources in the fight against sophisticated hackers and rapidly emerging threats.
  • Automated Threat Intelligence- Detect Advanced Malware and Protect Big Data Recorded: Sep 10 2013 40 mins
    Jim Deerman, Head of Engineering, ISC8 Secure and Scott Millis, Chief Security Strategy Officer, ISC8 Secure
    Join us to explore the concept of using automated tactical intelligence in the war against advanced malware. Cybersecurity solutions must be able to identify the tactical steps of the kill chain of sophisticated attacks and Advanced Persistent Threats (APTs). By automatically identifying these tactical steps and alerting the operator, the malware can be stopped prior to devastating damage or critical data theft occurring. Explore how these next-gen solutions utilize network topology and knowledge of advanced malware’s tactics to identify hosts that have been compromised. Unlike other tools that only work on a single event or signature, advanced threat detection solutions must be able to analyze and correlate network activities over weeks or months to identify the most sophisticated attacks - and do it automatically, saving valuable forensic analysts time and reducing the likelihood of missing serious bad actors.
ISC8 Secure for Advanced Threat Detection
ISC8

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automating Advanced Threat Detection for Speedier Identification of Next-generat
  • Live at: Dec 3 2013 6:00 pm
  • Presented by: Jim Deerman, Head of Cybersecurity Engineering, ISC8
  • From:
Your email has been sent.
or close