Defeating cyber attackers: Best practices for leveraging adversary & threat intelligence with security analytics

Click here to register

Date: Tuesday, September 29, 2015

Time: 2:00 p.m. ET/ 11:00 a.m. PT

This year over 85% of large organizations were targeted by advanced attackers according to Symantec's 2015 Internet Security Threat Report. Was your organization one of them?

With targeted attacks on the rise, organizations need to leverage adversary and threat intelligence with advanced security analytics to accurately detect and respond to early indicators of compromise and avoid the risk of experiencing a high impact breach.

In this webinar, Security experts from LogRhythm and Symantec explain common ways networks are targeted and explore best practices for effectively prioritizing and responding to threats that have penetrated the network. They will also discuss how actionable adversary and threat intelligence generated by Symantec DeepSight can be automatically consumed by LogRhythm's Security Intelligence Platform to correlate external threat data with other high risk events recognized across the IT environment to immediately expose highly concerning activity.

Key themes to be covered include:

·         Emerging attack motives and strategies

·         Maximizing prevention, detection, and incident response

·         Corroborating external threat intelligence with behavioral changes on the network

Prioritizing threats to prevent attack propagation

Speakers:

James Carder, CISO & VP LogRhythm Labs

Al Cooley, Director of information security services business, Symantec

Sponsored by:


You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters