Training

Incident & Breach Response , Next-Generation Technologies & Secure Development , Security Operations

Case Study: How Threat Intelligence was Used to Defeat an Advanced Attack in Progress

Case Study: How Threat Intelligence was Used to Defeat an Advanced Attack in Progress

Many organizations extend the dwell time of advanced threats by collecting the necessary data for a response after detection - failing to understand root cause in the process. This webinar will cover:

  • Emerging threats, strategies and solutions to improve your detection and response capabilities
  • Value of real-time aggregated threat intelligence to enhance attack discovery
  • Power of layering threat intelligence over proactive data collection to customize detection, accelerate response, and create a feedback loop between internal and external threat intelligence
  • Review a case study of one large oil & natural gas industry customer and how they were able to effectively aggregate and act on threat intelligence to protect their networks

Background

Businesses have not leveraged threat intelligence aggregated from trusted communities, open source, and threat intelligence vendors - missing emerging threats as they are discovered. Join Ben Johnson, chief security strategist for Bit9 + Carbon Black, and Andrew Pendergast, product director for ThreatConnect to learn how to accelerate your response to a breach discovery.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.