No Place to Hide: Using Network Visibility to Detect Well-Hidden Threats

February 14, 2018 from 04:00 PM – 05:00 PM UTC
|

Attackers today are highly skilled, and they know how to stay hidden. From quickly deleting log history to cover their tracks to stealing employees’ credentials to appear as insiders, cybercriminals are well-versed in evading traditional security defenses. However, despite their best guises, they can’t hide their network footprints. To detect advanced and targeted attackers, you need to look at more than logs alone. Learn how IBM QRadar enriches log data with real-time packet inspection and user and entity behavior analytics to uncover even the best-hidden threats.

Join this webinar to learn:

  • Common tricks attackers use to evade detection;
  • Defensive approaches you can take to improve your time-to-detection; and
  • How deep network visibility and historical analysis can help uncover even the stealthiest threats.

Register Now

Speakers

Lauren Horaist

Security Intelligence Product Marketing

Thomas Obremski

QRadar Offering Manager

Jose Bravo

Security Architect

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today