Events

Published on February 1st, 2017 | by Tony Thompson

Doubling-Down on Breach Detection at RSA 2017

It’s that time of year again, the time when the cybersecurity industry convenes in San Francisco for the annual RSA Conference. What’s not to love if you’re a security pro: lots of top tech in one place, surrounded by peers you can learn from, security leaders sharing ideas, and of course, the parties.

It shouldn’t come as any surprise that the topic of “breach” remains front-and-center for this show. Sure, not every session will use that exact word, but the implication is ever-present.

Take the keynote address by Rep. Michael McCaul, chairman of the House Homeland Security Committee who is leading a discussion titled, “The War in Cyberspace: Why We Are Losing–and How to Fight Back.”

Or what about the keynote by Palo Alto Networks CEO and Chairman Mark McLaughlin titled “The Coming Disruption in Security.”

Then there’s Matt Moynahan, CEO of Forcepoint, talking about “Protecting People and Content from Threats Already on the Inside.”

Each of these themes scream “breaches are coming…now what.” And for good reason. The breach problem persists with a breach-of-the-week, or sometimes more, being profiled in the news. The attack sophistication and elusiveness is at an all-time high.

SS8-RSA-Booth-South_This is why SS8 is doubling-down on breach detection, and our presence at the RSA Conference 2017. This year you can find us showcasing our time machine for breach detection in both the North hall (N4705) and South hall (S423) of the Moscone Center in San Francisco.

We will be profiling real-world threat detection and response use cases based on the recent risk assessments we’ve conducted in critical infrastructure, retail, education, and healthcare organizations.

You’ll see on-demand demos of our time machine model for breach detection and specifically how network retrospection accelerates advanced threat detection. We’re excited to unveil some exciting new features of our BreachDetect product that make breach detection even faster and easier for users without forensic investigation expertise.

breaches-shirt2We’ll also have copies of the 2016 Threat Rewind Report on-hand, which summarizes the top evasion and exfiltration techniques discovered during network assessments performed last year.

Finally, be sure to stop by our booth in the North or South hall and ask for a demo to get a Breaches are Coming T-shirt.

If you need a pass to the expo, register with the following code: XE7SS8B.



Leave a Reply

Back to Top ↑

Show Buttons
Hide Buttons