Many organisations are noticing that the frequency of attacks is on the rise and the landscape of threats is constantly changing. Therefore, it is important to invest in and re-evaluate your Detection and Response system on a regular basis.
In this session, join our panellists as they will share their thoughts on:
· How to build Detection and Response infrastructure in an organisation and what’s the right way to do it
· Important factors to consider building a successful D&R system
· How to leverage the data and gain accurate real time intelligence
This panel session discusses the challenges associated with the increased (and increasing) legislative and regulatory landscape of cyber incident response. Throughout this session domain experts from law, technology, cyber response management, and enterprise security backgrounds will be available to take live questions from attendees as it relates to these challenges. Main webinar take-aways include:
With threat actors constantly evolving their tactics, techniques and procedures (TTPs), it is important that organizations are aware of the latest TTP trends to protect themselves.
Alert Logic has dedicated SOC analysts, data scientists and security researchers to continuously hunt for the latest and emerging threats and campaigns. This human-led process has complimented automated detection and helped stop threat actors from evading.
During this webinar Alert Logic will share understanding of distinctive threat actor groups it has amassed and how it has been keeping track of TTPs used.
John Davies, product manager at Alert Logic, will explore the process and benefits behind activity clustering. The former threat hunter will share information on the favored tactics used by threat groups, uncovered from real-life examples within the Alert Logic customer base.
Join this session to learn:
· The process and benefits behind activity clustering
· Which TTPs are favored by threat groups and what that tells us about them
· Real-life examples of identifying compromises from Alert Logic’s research
Recovery is becoming a major trend in the market in cyber security. Before that people were focusing on Detection & Response, but once you’re attacked, you need to have the best recovery process in order to restart your business. Rani Halimi will be joining this webinar to share his expertise and best practise on: