Cyber Threat Hunting: Identify and Hunt Down Intruders

InfoSec Institute

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand webinar, Cyber Threat Hunting: Identify and Hunt Down Intruders. The webinar covers: The job duties of a Cyber Threat Hunting professional.
Watch Now

Spotlight

Read InfoWorld's review of the Lancope Stealth Watch System for detecting network attacks. According to the reviewer, "StealthWatch is an awesome tool and I recommend it for everyone."


OTHER ON-DEMAND WEBINARS

Infosecurity Webinar: Building a Business Case the CFO Can Understand

Information Security Forum

Do you feel like the economics of security often favours the attacker? Are you spending more and more, yet still feel like you are not achieving anything? How can you deliver a return on investment (ROI) on what you have chosen to invest and prove that you have delivered a total economic impact from a security perspective? No one expects a CFO or board to write a blank check for security, which is why explaining the savings that an organization can realize in terms of a more efficient security team, lower hardware costs, and minimized risk – is paramount to understanding its value. In this webinar, we will discuss how a full examination of the effect of technology on the entire organization can present clear opportunities to save critical funds and build a business case that the CFO can understand.

Disaster Recovery: What to Expect When You Declare a Disaster

oin Catherine Roy, Sr. Manager of the HOSTING Project Management Organization and Brian Frank, HOSTING Cloud Services Manager, for a discussion on best practices in declaring a disaster and implementing your disaster recovery solution. Having implemented over 300+ disaster recovery solutions, the team will draw upon real-world experience and give valuable, practical advice for handling your DR solutions in all cloud environments -- large, small, simple and complex. The following topics will be covered: •Business Continuity •Prepping for Disaster •Disaster Recovery Testing •What happens when you declare a Disaster

Responding to Cybersecurity Challenges in Higher Education

Proofpoint

Universities are faced with a constantly evolving cyber threat landscape as well as an ever-changing faculty and student body. With limited budgets and a shortage of skilled security staff, doing less with more is not a mantra, it's a way of life that requires smart choices and maximizing resource efficiency.

Dealing with Threats that Get Through your Defenses

Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.