Turning tables on cybercriminals

Click here to register

Date: Tuesday, November 17, 2015

Time: 2:00 p.m. ET/ 11:00 a.m. PT

The attacker defender asymmetry is well known. While it's impossible to defend all possible places of network compromise, defenders can shift the balance in their favor once the attacker has breached an endpoint. Doing so requires a focus on the inside of networks and all the data that passes back and forth there. With the security architecture to continuously monitor and analyze network data, organizations can uncover the patterns of that telegraph attacker lateral movement and malicious communication before data is stolen or lost. Attendees of this webcast will get recommendations on building the kind of security architecture that shifts the power balance toward defenders.

They will get practical advice for:

  • Security architecture re-design
  • Leverage of network-wide visibility for attack detection
  • Sustaining and scaling multi-tiered security environments
Speaker:

Johnnie Konstantas, Director, Security Solutions Marketing & Business Development

Sponsored by:


You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters