Sponsored By

sponsor Visit https://securityweekly.com/extrahop for more information!

Every organization gets compromised – it’s how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach.

This segment is sponsored by ExtraHop Networks.

Visit https://securityweekly.com/extrahop to learn more about them!

For a free trial of Reveal(x)360 visit: www.extrahop.com/swbh Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.

Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4

Full Episode Show Notes

Navigating a Post-Compromise Reality



[caption id="attachment_210" align="alignleft" width="120"]Matt Alderman Matt Alderman - CEO[/caption]


[caption id="attachment_210" align="alignleft" width="120"]Michael Sanders Michael Sanders - Senior Engineer [/caption]
[audio src="http://traffic.libsyn.com/sw-all/HSC_Day_2_Michael_Sanders_ExtraHop-0_converted.mp3"]