Endpoint Detection & Response (EDR) , Next-Generation Technologies & Secure Development

Turning the Elusive into the Tangible: Understanding Attacker Behavior and How to Hunt Endpoint Threats

Join eSentire and VMware Carbon Black as they discuss the latest endpoint threats and how to defend against them.

If there is one constant in endpoint security, it’s that attackers continuously find new ways to circumvent detection. Organizations must not only defend against these attacks, but also be able to hunt for new attacker behaviors. Join eSentire and VMware Carbon Black as they discuss the latest endpoint threats and how to defend against them.

Key insights include:

  • What are the latest endpoint threats and how to protect against them
  • Why technology and automation are important parts of the puzzle, but not enough to understand and predict new attacker behavior
  • How organizations can shift from a purely prevention (blocking) mindset to a behavioral (hunting) methodology
  • How organizations can continuously evolve people, processes and technology to adjust to increasingly elusive attacker behavior

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.