Training

Fraud Management & Cybercrime , Security Operations

Fireside Chat: Cybersecurity Judo - Using the Adversary’s Strength Against Them

Fireside Chat: Cybersecurity Judo - Using the Adversary’s Strength Against Them

Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading perimeter defenses.

Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this behavior to your advantage?

View this fireside chat OnDemand now, and learn from the discussion on how to use these attackers’ strength against them and how SOC teams should hunt for attackers while leveraging network visibility and network metadata. Topics include:

  • How network packet data is the best way to detect early signs of compromise
  • Why complex infrastructures indicate that blind spots are only getting worse
  • How network detection and response (NDR) tools are the best to fight ransomware

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.