How to speed incident response with network data

Tuesday, June 4, 2019 

11:30 a.m. ET/ 8:30 a.m. PT

Investigating and responding to security incidents can take hours or days if analysts are forced to manually correlate data and contact other teams to access secondary system logs or even packet captures they need to be confident about what actually happened.
 
Join us as we step through a rapid, end-to-end investigation and response process, from early breach detection to forensic analysis in just minutes, relying on Network Traffic Analysis for authoritative and detailed data.
 
Identify which devices and users were involved in an incident
Dig into transaction records and layer 7 payloads to see exactly what users and resources were involved
Access packets and decryption keys for incontrovertible proof and root cause analysis
Investigating and responding to security incidents can take hours or days if analysts are forced to manually correlate data and contact other teams to access secondary system logs or even packet captures they need to be confident about what actually happened.
 
Join us as we step through a rapid, end-to-end investigation and response process, from early breach detection to forensic analysis in just minutes, relying on Network Traffic Analysis for authoritative and detailed data.
 
  • Identify which devices and users were involved in an incident
  • Dig into transaction records and layer 7 payloads to see exactly what users and resources were involved
  • Access packets and decryption keys for incontrovertible proof and root cause analysis
Presenter
Speaker to Come


View Biography

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)

Submit