Five Ways to Spot an Attacker in Your Network
This webinar discuss in depth, five key things to look for to spot an attacker in your network.
This webinar discusses the processes that can make security operations effective at proactive and realtime detection, and some of the underlying technology that can, buzz aside, enable real results.
In this Webinar David Thompson, Sr. Director, Product Management, LightCyber explains unlocking the true potential of Machine Learning to enhance network security.
In this webinar David Thompson Sr. Director, Product Management at LightCyber discusses “Advanced”, “Persistent”, “Threat”, which of the three is the key word? Advanced attackers inevitably get into our networks, why and how the LightCyber Magna’s Active Breach Detection features determine the intrusion behavior method and when caught early can prevent theft and damage to your network.
Think Like an Attacker: What You Must Know About Targeted Attack Techniques
Register and watch this SANS webinar led by SANS Institute director John Pescatore to learn more about the move from a prevention-only strategy to one with detection based on behavioral profiling from both network and endpoint visibility. This webinar reveals many of the operational techniques of a hidden attacker to which most companies are blind. The presentation follows with a demonstration of the new Cyber Attack Training System (CATS), including a simulated external attack. We also unveil the results of the Hacker Simulation Challenge, where participants used the CATS environment to break into a network to locate and exfiltrate a target data set.
Implementing Active Breach Detection
Watch this SANS webinar led by SANS Analyst David Shackleford to learn more about the critical role detection needs to play in a successful security strategy. He asks the question — “Do you have confidence you can prevent 100 percent of intrusion attempts, and if not, can you find the attacker once they get in?” Trying to do detection with the same signature-based techniques that attackers circumvent is a fool’s errand. Instead, active breach detection utilizes machine learning techniques to profile what is normal on your network, and through integrated analysis of your network and endpoints exposes anomalous attacker behaviors. These behaviors are inherent to any successful attack, and if spotted early can ensure effective response and prevent damage. This webcast presents the role of behavior-based breach detection and the new SANS Analyst Program review of the LightCyber Magna Platform and its intrusion detection features.