Maximize Existing Security Tools - Address Palo Alto CVE-2024-3400

Logo
Presented by

Bassam Khan, Vice President of Product Marketing, Gigamon and Stephen Goudreault, Cloud Security Evangelist, Gigamon

About this talk

In light of the critical CVE-2024-3400 vulnerability disclosed by Palo Alto Networks, it’s clear that traditional security tools need to be leveraged more effectively to detect and mitigate sophisticated threats. This webinar will guide attendees on how to enhance the utility of existing security infrastructures, like NDR, SIEM, Elastic, or even observability tools, to achieve deeper network visibility and security intelligence, ensuring robust defense mechanisms against both known and emerging threats. This is a show-and-tell session where you will see advanced practices for: - Enhanced East-West Traffic Monitoring: Strategies to ensure comprehensive inspection of lateral communication within networks using your current security tools. - Decryption and Compliance: Balancing the decryption of network traffic for security purposes while maintaining strict compliance and privacy standards. - Intelligence Extraction from Network Traffic: Techniques to harness rich metadata from network packets in your SIEM for proactive threat detection. - Post-Breach Threat Detection: Best practices for utilizing network-derived metadata for identifying and responding to post-compromise activities, including practical applications of Indicators of Compromise (IoCs).
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (119)
Subscribers (24468)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.