Discovering advanced threats: What you cannot see can hurt you

Click here to register

Date: Thursday, June 18, 2015
Time: 2:00 p.m/ 11:00 a.m PT

“71% of organizations were compromised by a successful cyber-attack in 2014”, according to a 2015 Cyberthreat Defense Report from CyberEdge Group.  Was your organization one of them? 

On average, it took compromised organizations over 200 days to detect attackers once they had penetrated the network.  How long would it take your organization?

In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to successfully penetrate networks, and how next-generation security solutions can be leveraged to detect, respond to and neutralize these threats sooner.  

You will learn how log data, net flow, and other machine data generated across your network, including contextual identity and access data from the Cisco Identity Services Engine (ISE), can be leveraged by LogRhythm's award-winning security intelligence and analytics platform to reduce your organization's mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to reduce the risk of a material breach or cyber incident.

Join this webinar to learn:

o   Common ways hackers get into your network

o   How threat actors attempt to avoid detection

o   Tips on finding the hacker trail: how to look in the right place

o   How to expand and accelerate your internal threat detection and response capabilities

Speakers:
Seth Goldhammer, Director of Product Management, LogRhythm
Doug Hurd, Manager – Technical Alliances, Cisco

Sponsored by:





You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters