Published on July 20th, 2016 | by Tony Thompson
Upcoming Webinar: Breaches are Coming!
Cyber threats are just like the threats beyond the Wall in Game of Thrones – some of them are simple and obvious, like a Wildling attack; but they can also slip past perimeter defenses and hide themselves in the normal flow of network communications, only to reveal themselves as threats much later. A lot like a former deceased Night’s Watchman turning into a White Walker and terrorizing Castle Black.
Join us in our upcoming webinar, on August 10, 2016, to learn:
- Why IT and cyber security organizations today struggle with breach detection and investigations
- Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
- A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow
Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the Network remembers. However, with traditional solutions like SIEMs, packet recorders and network forensic tools, your network can only really remember for up to 30 days.
A lack of high-definition network visibility has extended the breach detection window and prolonged already-lengthy data breach investigations. But if an attack is designed to hide from preventative tools, then it’s that much harder to discover. But breaches can’t hide from the network; they need the network to get out1.
But the night doesn’t always have to be dark and full of terrors. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future. The past is already written, but the ink doesn’t have to stay dry.
Speakers Tony Thompson, Vice President, and Rajdeep Wadhwa, Product Management, will also take a look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.
Even if you can’t join us on August 10, you can still register to view the webinar on demand afterwards. Don’t forget to register today!
1Rick Kessler, CIO Chenega Corporation