Discover the (ISC)² Community 

Join the ISC2 Community and share your cybersecurity knowledge and experience with other pros – (ISC)² members and non-members alike!

 

Automate Threat Management and Elevate Security Operations.

Presented by Vectra Networks

There are three generally accepted phases to a cyber defense strategy:

  1. The Prevention Phase, which is the strategy and controls put in place to prevent threats from entering the environment.
  2. The Active Phase, which is the phase when the attack is live inside the network and is the longest phase of an attack.
  3. The Clean Up Phase, which is the response initiated after the threat is detected.

Organizations must address all phases. However, there is a disproportionate allocation to prevention resulting in blind spots during the active phase. The lack of visibility in the active phase forces the security team to manually identify threats. This session will focus on how to Automate Threat Management in real-time in the active phase of the attack. Identifying and managing threats in an automated manner is paramount in reducing the active phase of the attack and ultimately the impact of the threat. Automating threat management improves efficiency of security team by allowing them to focus on security intelligence and removing the identification and prioritization of real time active threats.

This session will also include a demonstration of technology to automate threat management, as well as discussions around the concepts of machine learning and data science.

 

Presenter:

Dale O’Grady, Senior Security Engineer, Vectra Networks

Dale is a 25 year veteran in Information Technology and has extensive experience with Layer 2-7 security. He has had the good fortune of working as a Product Manager for many security technologies such as Firewalls, Proxies, Intrusion Detection/Prevention Systems, Traffic Classification, Mobile Security and Network Access Control Systems. Dale has authored a number of articles published in industry known IT Security publications and he currently spends his time assisting customers with their security strategies.