It�s Great to Detect a Breach, but Better to Detect the Attacker
Focusing on Threat-Based Detection is the Key to Your Ability to Detect Attacks.
The “cat-and-mouse” game between Attackers and Defenders is as old as the LoveLetter virus. While script-kiddies have matured to become cybercriminals, hacktivists, and state-sponsored adversaries, sometimes it feels like the Defenders are stuck in 1999. We deploy anti-virus solutions, monitor the perimeter, and wait and see. Yes, today’s security technology is “Next Gen,” “2.0,” and “Meta,” but the concept is the same. Set the trap and wait to be attacked.
And while the focus has been on stopping the active Attacker in the act, innovations in Big Data now allow us to detect the Attacker targeting your organization and stop them before they strike. To be clear, we are not talking about intelligence feeds managed through a platform, but rather a new approach to detection that harnesses the insights of intelligence to profile the Attacker, pattern the attack, and align the Attacker’s intent with the reality of your security posture.
In this presentation, Mark Alba, Chief Product Officer, Anomali, covers:
- Profiling the Attacker
- Mapping the evidence to the threat actors
- Detecting evidence of attacks using indicator-based detection
Watch the webinar to understand how your relevant threat landscape helps influence your detection, investigation, and response.
Speaker and Presenter Information
Mark Alba, Chief Product Officer, Anomali
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Thu, Jan 5, 2023, 11:00am - 11:30am
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
Anomali