Monitor and Identify Malicious Hackers Before They Cripple Your Organization



Today’s threats are more sophisticated than ever and despite significant investment in prevention technologies many organizations continue to suffer damaging attacks.  This webinar provides a best practices model to minimize risk that combines prevention technology with the continuous monitoring of a Security Operations Center. 

 

The session profiles a sophisticated, modern cyber attack and summarizes key lessons learned.  It also provides insight into the major components of an effective incident response plan that should be in place to provide timely containment to advanced threats that have bypassed existing security controls.

 

Walk away with:

  • Best practices for threat detection and response model to minimize risk
  • A use case of a modern cyberattack to illustrate how sophisticated threat actors can bypass existing security controls
  • Key elements of an effective incident response plan
  • Various threat containment methods for your enterprise

Speaker and Presenter Information

Dave Martin
Sr. Director, Product Management
Open Systems

Relevant Government Agencies

DOD & Military, Other Federal Agencies, Federal Government, State & Local Government


Event Type
Virtual


This event has no exhibitor/sponsor opportunities


When
Wed, Dec 16, 2020, 11:00am - 12:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

Open Systems


Organizer
Cyber Security Hub | IQPC


Contact Event Organizer



Return to search results