Attackers Can Pivot through Your Infrastructure, What if You Could Pivot through Theirs? (OpenDNS)

  • Thursday, April 23, 2015 | 12:50 PM – 1:10 PM | South | Room: Expo Briefing Center

View all Sessions

As the threat landscape continues to evolve, the massive amounts of data and traffic flowing through enterprise networks are becoming increasingly vulnerable; threat management through traditional detect-and-respond approaches is now virtually impossible. Without copies, samples or details how can security teams possibly prevent, contain and inform on targeted attacks? We will introduce one of the industry's newest research techniques: analyzing the attacker infrastructure. With this approach, security teams can learn how to leverage big data and algorithms to predict and prevent attacks before they happen.

This document was retrieved from on Fri, 21 Oct 2016 10:53:05 -0400.
© 2016 EMC Corporation. All rights reserved.