Stealth Tactics for Continuous Visibility: Establishing Trust Visibility and Resilience to Combat Cyber Threats Webcast
Don’t be caught with your guard down, your networks open to attack.  Today’s threat environment is constantly evolving and maturing in levels  of sophistication and capabilities. The old ways of doing things are no  longer enough. Relying solely on the organization ‘s perimeter to  detect and prevent these threats is full of holes. Security Operations  must mature along with the threat and leverage the internal network as a  sensor grid to proactively identify Advanced Persistent Threats (APT).   This webinar will specifically look at the role of the network and how  it can be leveraged to provide visibility into these evolving and  sophisticated threats.  
 
Network telemetry sources, such as  NetFlow, IPFIX and Network Based  Application Recognition (NBAR), have long been utilized for network  performance functions and have emerged as a valuable means for always-on  security monitoring. This webinar will look at how these capabilities  are collected and analyzed to give security operation teams actionable  insight into network traffic to spot sophisticated threats and keep them  out of your way. Please join our content experts as they discuss the  value of utilizing network telemetry and advanced security analytics to  address this modern and evolving threats. 
 
Attendees will learn how to:
- Create a distributed sensor grid for continuous visibility  
- Unify visibility inside and across the distributed network 
- Use flow-based network behavioral analysis to detect Advanced Persistent Threats (APT) 
- Demonstrate compliance (NIST 800, CNCI, TIC)
Event Type
						  Webcast
						
When
						  Tue, Jul 26, 2011, 2:00pm - 3:00pm
							
						
Cost
| All: | $0.00 | 
Website
Click here to visit event website
															Organizer
Digital Government Institute
							
																					






