Monitor and Identify Malicious Hackers Before They Cripple Your Organization
Today’s threats are more sophisticated than ever and despite significant investment in prevention technologies many organizations continue to suffer damaging attacks. This webinar provides a best practices model to minimize risk that combines prevention technology with the continuous monitoring of a Security Operations Center.
The session profiles a sophisticated, modern cyber attack and summarizes key lessons learned. It also provides insight into the major components of an effective incident response plan that should be in place to provide timely containment to advanced threats that have bypassed existing security controls.
Walk away with:
- Best practices for threat detection and response model to minimize risk
- A use case of a modern cyberattack to illustrate how sophisticated threat actors can bypass existing security controls
- Key elements of an effective incident response plan
- Various threat containment methods for your enterprise
Speaker and Presenter Information
Dave Martin
Sr. Director, Product Management
Open Systems
Relevant Government Agencies
DOD & Military, Other Federal Agencies, Federal Government, State & Local Government
Event Type
Virtual
This event has no exhibitor/sponsor opportunities
When
Wed, Dec 16, 2020, 11:00am - 12:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
Cyber Security Hub | IQPC