Building a CISO Response Strategy to Advanced Threats


Posted on in Presentations

SUNBURST was a rude awakening for many security teams, and it won't be the last time CISOs face tough questions about how an adversary evaded defenses and stayed hidden. With advanced threats persisting inside the network for months, security teams need a new plan. This session will discuss strategies to detect, investigate, and respond to post-compromise attack activities.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Jeff Costlow

Speaker

CISO, ExtraHop


Share With Your Community