The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that window, there are key moments where the attackers take an action that might alert you to their presence. If you notice it, then you can mitigate the attack before it’s too late. But uncovering these indictors of compromise within your environment requires visibility into all network packets and endpoint processes running within, plus an understanding of what tactics, techniques and procedures (TTPs) to look out for -- from early stage intrusion and reconnaissance to lateral movement all the way to a final-stage malware or ransomware attack.
This webcast will:
Stay tuned for our Democast on June 28th, "Part 2: Detection & Response Demo: Patrolling Every Packet & Process for Signs of Compromise."
Global Security Technologist
Chad Skipper serves as Global Security Technologist in the Network and Security Business Unit at VMware. With more than 25 years in Information Security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.
Director of Community Content
As director of community content at CyberRisk Alliance, Bradley Barth develops content for SC Media online conferences and events, as well as video/multimedia projects. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.