Cybercrime , Fraud Management & Cybercrime , Network Detection & Response
Fireside Chat: Cybersecurity Judo - Using the Adversary’s Strength Against Them
Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading perimeter defenses.
Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this behavior to your advantage?
View this fireside chat OnDemand now, and learn from the discussion on how to use these attackers’ strength against them and how SOC teams should hunt for attackers while leveraging network visibility and network metadata. Topics include:
- How network packet data is the best way to detect early signs of compromise
- Why complex infrastructures indicate that blind spots are only getting worse
- How network detection and response (NDR) tools are the best to fight ransomware