Posted on
in Presentations
Cyber-defense centers on “what” a technology is designed to look for, with capabilities and limitations depending on method. Three distinct approaches have emerged: traditional IOCs, anomaly detection and behavioral analytics. Unfortunately, marketing has muddied these terms beyond recognition—this presentation will correct this by critically examining each approach and its capabilities.
Learning Objectives:
1: Gain understanding of defense detection methodologies.
2: Evaluate the costs and benefits inherent to different detection approaches.
3: Make decisions for the organization relevant to the organization's security needs.
Pre-Requisites:
General knowledge of detection methodology and technologies, awareness of current product types performing threat detection and alerting, and broad knowledge of general security incidents.
Learning Objectives:
1: Gain understanding of defense detection methodologies.
2: Evaluate the costs and benefits inherent to different detection approaches.
3: Make decisions for the organization relevant to the organization's security needs.
Pre-Requisites:
General knowledge of detection methodology and technologies, awareness of current product types performing threat detection and alerting, and broad knowledge of general security incidents.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community