The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.
Join this webinar to explore how ransomware loitering allows security analysts to use network visibility, detection, and response to discover malicious activity between initial compromise and encryption. Our experts will cover:
• How threat actors rely on your network, and how you can use network visibility to your advantage
• The importance of inspecting encrypted traffic, the challenges of doing so, and the NSA's guidelines on addressing those challenges
• How a new and innovative approach to network detection and response is transforming the SOC (Security Operations Center)
Attendees are eligible to receive 1 CPE credit.