We're Going on a Threat Hunt

Logo
Presented by

George Sanford, Josh Day, and Chris Borales

About this talk

Is the thought that threat actors could be hiding under your bed, in your closet, or having a wild rumpus in your network keeping you up at night? Does the thought of bad guys hiding in plain sight make every day a terrible, horrible, no good, very bad day? Even though your network should be a safe place, breaches are inevitable. Come along as we take a whimsical but serious approach to thinking about looking for evil-doers in your environment. You’ll learn how to find the signs of attacker activity “stumble-trip” style – by looking for clues and indicators beyond just detections and signatures. You’ll learn about the tools you’ll need to spot attacker behavior before they can wreak havoc. ____ This session originally aired during Gigamon Visualyze Boot Camp
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (185)
Subscribers (26111)
Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.