DEEP DIVE - Doing more with what you have - Breakout
Uncover network threats with advanced statistics
In this session, we will introduce algorithms to detect malicious network activity. We will demo in a lab botnet activity and show the theoretical and practical ways to detect and respond to these threats. At the end of the session, you will learn how to take the information and apply it in your own solution with your existing firewall solution.
By Kennett Harpsoe, Senior Cyber Analyst
Видео DEEP DIVE - Doing more with what you have - Breakout канала Logpoint
In this session, we will introduce algorithms to detect malicious network activity. We will demo in a lab botnet activity and show the theoretical and practical ways to detect and respond to these threats. At the end of the session, you will learn how to take the information and apply it in your own solution with your existing firewall solution.
By Kennett Harpsoe, Senior Cyber Analyst
Видео DEEP DIVE - Doing more with what you have - Breakout канала Logpoint
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
SAP-Anwendungssicherheit mit Logpoint umsetzen (German)Creating custom parsersIngesting new log sourcesSecurity Hardening & Baselining im Angesicht von NIS2 und KRITISHow to manage casesMatt Ellis - Customer Success - LogpointRetrieving and searching remote dataHow Logpoint maps to the MITRE ATT&CK frameworkThreat Landscape - How to utilize information security frameworks effectively - Breakout sessionLogpoint Demo - Converged SIEMUser whitelisting with UEBA and SOAR - Logpoint SIEM, SOAR, and UEBA IntegrationUsing real time and batch analyticsThreat Landscape - Easily get logs from all your cloud applications - BreakoutHow-to: A Simple Setup for LogPoint SIEMA walkthrough of the Logpoint dashboardLogPoint UEBALogPoint RoadmapReducing the Risk of Data ExfiltrationInfrastructure and Cloud SecurityEdy Almer - Senior Product Manager - LogpointMartha Chrisander - Head of Product Marketing - Logpoint