Defeating cyber attackers: Best practices for leveraging adversary & threat intelligence with security analytics
Date: Tuesday, September 29, 2015
Time: 2:00 p.m. ET/ 11:00 a.m. PT
This year over 85% of large organizations were targeted by advanced attackers according to Symantec's 2015 Internet Security Threat Report. Was your organization one of them?
With targeted attacks on the rise, organizations need to leverage adversary and threat intelligence with advanced security analytics to accurately detect and respond to early indicators of compromise and avoid the risk of experiencing a high impact breach.
In this webinar, Security experts from LogRhythm and Symantec explain common ways networks are targeted and explore best practices for effectively prioritizing and responding to threats that have penetrated the network. They will also discuss how actionable adversary and threat intelligence generated by Symantec DeepSight can be automatically consumed by LogRhythm's Security Intelligence Platform to correlate external threat data with other high risk events recognized across the IT environment to immediately expose highly concerning activity.
Key themes to be covered include:
· Emerging attack motives and strategies
· Maximizing prevention, detection, and incident response
· Corroborating external threat intelligence with behavioral changes on the networkPrioritizing threats to prevent attack propagation
James Carder, CISO & VP LogRhythm Labs
Al Cooley, Director of information security services business, Symantec