Back

Introduction to Pro-Active Intruder Hunting, Part 2

ON-DEMAND WEBINAR

It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly.

In Part 1 of our Intruder Hunting Webinar Series we discussed why a well-planned, pro-active Intruder Hunting Program should be a cornerstone of any Enterprise Cyber Security Program. In Part 2, we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.

Join Part 2 of our Intruder Hunting Webinar Series to Discover: 

  • How to identify what you are looking for
  • How to select and use the tools at your disposal
  • How to build an Intrusion Sensor Array
  • The fundamentals of data collection and analysis for use in intruder detection
  • Creating an Integrated security and risk management architecture

* Note that this is the second in a 2-part series; this session is best suited to those with a technical background in security.

Introduction to Pro-Active Intruder Hunting, Part 2

ON DEMAND

Introduction to Pro-Active Intruder Hunting, Part 2

Join Bruce A. Roton, VP and Global Head of Customer Success at CyberProof on February 20th for Part 2 of our Intruder Hunting webinar series.

Bruce A. Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP, has over 40 years of experience in Network and Security services, bringing a wealth of knowledge to this series. Don't miss out on taking part of the live conversation.

LISTEN ON-DEMAND