Intrusion vs. breach: How security analytics & automated response can improve your chances of avoiding a breach

Click here to register

Date: Wednesday, August 12, 2015

Time: 2:00 p.m. ET/ 11:00 a.m. PT

60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds of days to detect the intruders.  Fortunately, an intrusion does not equal a breach.  In fact, there are usually several steps that typically follow an initial compromise before the bad guys get away with the goods or disrupt a critical service.   Detecting early warning signs such as an initial system compromise, command and control activity or suspicious lateral movement of intruders can provide the necessary lead time to respond and neutralize a threat before the intrusion leads to a material breach.     

In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization's risk of experiencing a material breach or cyber incident. 

Attend this webinar if you:

  • Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
  • Struggle to find the needle in the haystack of security events
  • Believe your current incident response process lacks adequate automation and efficiency
  • You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots
Speakers:

Seth Goldhammer, Director of Product Management, LogRhythm, Inc.

John Kindervag, Vice President, Principal Analyst, Forrester Research, Inc.

Sponsored by:


You must be a registered member of SC Magazine to post a comment.
close

Next Article in Vendor Webcasts

Sign up to our newsletters