Suspicious Minds—Hunting Threats that Don't Trigger Security Alerts


Posted on in Presentations

In this session we will dive into the different approaches threat actors have been implementing to avoid detection by security controls. To do this, speakers will look at how enterprises can hunt and triage suspicious activities across the network, cloud, and endpoint – those events that by themselves may be benign but when closely inspected reveal the attack vector.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Tal Darsan

Speaker

Director, MDR Services , Cato Networks

Etay Maor

Speaker

Chief Security Strategist, Cato Networks


Share With Your Community