How to Detect and Stop Attacks as They Occur with a Limited Budget


Posted on in Presentations

Attacks are getting better and more stealthy. Operating systems and applications, while hardened, still suffer from significant security vulnerabilities. What capabilities do you need to detect, remediate and smother attacks in real time? Join for a discussion of the endpoint detection trends, scenarios, tool capabilities, people and budget tradeoffs needed to secure your environment.

Learning Objectives:
1: Understand the endpoint detection capabilities available and how to select those most effective for attack detection.
2: Understand how to detect attacks when adding an endpoint detection tool is not advised or impossible in use.
3: Examine budget and people trade-offs required for SOC and IR processes, and maximize effectiveness of security spends.

Participants
John Allred

Participant

Senior Manager, EY

Security Strategy & Architecture

security operations intrusion prevention/detection infrastructure security incident response endpoint security


Topic

Subtopic


Share With Your Community