Date: Tuesday, December 8th, 2015
Time: 2:00 p.m. ET/ 11:00 a.m PT
“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches,” according to Gartner Research.
This shift in investment highlights the fact that organizations require a new security model designed to rapidly detect and neutralize cyber-threats that have penetrated the enterprise perimeter or originated from within.
In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to penetrate networks. The webinar will also cover how you can use next-generation security solutions to detect, respond to and neutralize these threats to reduce the risk of a material breach or cyber incident.
You will learn how machine data generated across your network—including contextual identity and access telemetry from the Cisco Identity Services Engine (ISE)—can be leveraged by LogRhythm's security intelligence and analytics platform to provide organizations with highly corroborated risk-based alerts and enable immediate automated response to contain threats by interfacing with Cisco pxGrid to take protective action.
Join this webinar to learn:
o Common ways hackers get into your network
o How threat actors attempt to avoid detection
o Tips on finding the hacker trail: how to look in the right place
o How to expand and accelerate your organization's mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR)
James Carder, CISO & VP, LogRhythm Labs
Scott Pope, Sr. Manager - Security Ecosystem Product Management and Business Development, Cisco Systems