|
Start Date:$-[WCStartDate]-$
Start Time:$-[WCStartTime]-$ $-[WCStartTimeZone]-$
Duration:$-[WCRuntimeDuration]-$
Abstract:
The Sunburst / SolarWinds attack illustrates the dwell-time problem we continue to see in advanced cyberattacks. It starts with an undetected breach, with adversaries in the network trying to find the “crown jewels.” Eventually, often months later, the breach is discovered, and attack details are released. At this point, security teams from other organizations that may have been targeted need to look back and search their event log data six or 12 months back to determine if they have been breached. Unfortunately, they often find out they can’t, because they don’t have the data online or the data is just not searchable.
Join Anomali for this demo session to learn how:
• Security analytics can complement your SIEM to immediately answer the most fundamental question: Have we been impacted?
• Continuous retrospective search can speed threat detection, investigation, and response—particularly for critical events like the recent Sunburst and SolarWinds malware attack.
• You can optimize the interplay between analyst research tools, security analytics systems, threat intelligence platforms, SIEM, and SOAR.
Get registered for the January 27th, Anomali Webinar: Detect the next Sunburst attack.
If you're already registered for the 1.27 Anomali: Detect the next Sunburst attack webcast, click below:
ALREADY REGISTERED?
Speakers
Joe Gehrke Solutions Architect Anomali As a Solutions Architect at Anomali, Joe Gehrke works with companies to build and operationalize threat intelligence programs and help solve some of their most complex challenges. Joe’s 20-year career in cybersecurity spans from security strategy to solution implementation. His current areas of focus include system interoperability, intelligence operationalization, and platform software development kits (SDKs)
Teri Robinson Executive Editor SC Media SC Media Executive Editor Teri Robinson has more than two decades of experience reporting and editing on tech and business issues.
|
1.27 Anomali: Detect the next Sunburst attack
Registration Is Closed
|
|
|
|