Timely threat detection is essential. Every second that a malicious actor lingers inside your network, the odds increase that your organization could be the victim of a major malware attack. Nation-state APT actors are especially adept at staying hidden – but if you know what TTPs and IOCs to look for and you have comprehensive visibility into the processes and packets flowing through your network, then you can take steps to root them out. This live democast will demonstrate how VMware's network detection and response solution (NDR) can uncover the various clues that threat actors drop as they infiltrate your network and execute their attack chains.
Global Security Technologist
Chad Skipper serves as Global Security Technologist in the Network and Security Business Unit at VMware. With more than 25 years in Information Security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.
Lead Cyber Security Solution Engineer
Ant Ducker, Lead Cyber Security Solution Engineer at VMware, has twenty+ years’ experience in engineering, deployment, operation and maintenance of network security platforms in the Provider, Financial & Enterprise verticals.
Specializing in: proactive and reactive malware defence, manual and automated threat hunting workflows, breach detection and NDR solutions, security systems integration with direct or orchestrated API, workflow integration for enterprise network security, SOC and threat hunting platforms.
Bill Brenner is VP of Content Strategy at CyberRisk Alliance -- an InfoSec content strategist, researcher, director, tech writer, blogger and community builder. He was formerly director of research at IANS, senior writer/content strategist at Sophos, senior tech writer for Akamai Technology's Security Intelligence Research Team (Akamai SIRT), managing editor for CSOonline.com and senior writer for SearchSecurity.com.