The worldwide spend on information security products and services is expected to reach $124 billion in 2019 – with detection, response and privacy regulations driving increased demand.* Clearly enterprises recognize the need for security beyond upfront preventative measures, but are you addressing the most common pitfalls in detection and response efforts?
Listen as former US Marine security threat hunter Brad Palm, security investigator Tim O’Neill, and certified ethical hacker Matt Allen, identify the four biggest gaps and discuss strategies that NetOps and SecOps need to implement to improve their overall security posture and effectiveness.
- Top 4 critical gaps in real-time and post-event security strategies
- Best practices for utilizing benchmarks to identify aberrant activities
- Strengths and limits of different network data types for threat hunting and post-event response
- Top metrics and wire-data needed for successful incident investigations
Brad Palm / Founder / BruteForce
An analyst working in the cybersecurity and network efficiency domains focusing on network capture and analysis, threat hunting and new tech testing for enterprise networks.
Matt Allen / Sales Engineer / VIAVI Solutions
An Ethical Hacker and 'network geek' motivated by making an impact on other engineers' daily grind.