Trending...
- Financial Solutions Inc. Receives the 2020 Best of Sheridan Wyoming Award
- Ziggurat Technologies' Zivolve™ is Now Available for Android Users on the Google Play Store, Revolutionizing Mobile Investing Beyond the Apple iOS App
- The Business Consultant behind The First Black-owned BP
FREMONT, Calif. - Californer -- Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a virtual breakout session at the 2020 RH-ISAC Cyber Intelligence Summit, titled: "Deceptively Simple Threat Detection." Tony Cole, Chief Technology Officer at Attivo Networks, will discuss the value of modern cyber deception and share ways that retail and hospitality organizations are using virtualized deception fabrics to gain rapid visibility and alert of in-network attackers.
WHO: Tony Cole, Chief Technology Officer, Attivo Networks
WHAT: Deceptively Simple Threat Detection
There are fundamentally two ways to stop an attacker. One is to pursue them and the other is to ambush them. Pursuing an attacker takes advanced training; it is complex and requires an extreme level of precision to detect attacks across all attack surfaces. Alternatively, the use of modern cyber deception has proven itself to be early and accurate in the detection of threats. Globally, retail and hospitality providers are stealthily using virtualized deception fabrics to efficiently plant decoys, bait, lures, and misdirections within their networks to ambush adversaries and trick them into revealing themselves.
More on The Californer
In this session, attendees will learn how deception technology is used to gain rapid visibility and alert of in-network attackers. They will also gain insights into the value organizations are gaining by:
- Reducing dwell time by 90% by detecting and denying lateral movement
- Improving privilege access management by derailing unauthorized active directory (AD) queries
- Detecting and diverting credential theft and reuse
- Pinpointing and validation of insider threat activity (employees, suppliers, third parties)
- Securing Cloud Operations and malicious network activities
- Defending legacy devices and point of sale (POS) terminals from attack
- Detecting and hindering ransomware attacks
- Gathering of forensic evidence and adversary intelligence (IoCs/IoAs/TTPs) reducing triage time by 12X
- Enhancing EDR and SOAR solutions
WHEN: Wednesday, October 7, 2020, 1:00 PM - 1:40 PM EST
WHERE: The three-day 2020 RH-ISAC Cyber Intelligence Summit will be fully virtual.
More on The Californer
To register for the event, visit https://summit.rhisac.org/rsvp/ and reserve your spot.
MEDIA: Tony Cole is available for interviews by request. If you are interested in expert commentary for any upcoming stories, please reach out to Matter Communications at PRAttivo@matternow.com.
WHO: Tony Cole, Chief Technology Officer, Attivo Networks
WHAT: Deceptively Simple Threat Detection
There are fundamentally two ways to stop an attacker. One is to pursue them and the other is to ambush them. Pursuing an attacker takes advanced training; it is complex and requires an extreme level of precision to detect attacks across all attack surfaces. Alternatively, the use of modern cyber deception has proven itself to be early and accurate in the detection of threats. Globally, retail and hospitality providers are stealthily using virtualized deception fabrics to efficiently plant decoys, bait, lures, and misdirections within their networks to ambush adversaries and trick them into revealing themselves.
More on The Californer
- Grassroots Advocacy Group Urges Biden Administration to Appoint a Doctoral Level Mental Health Professional to Lead SAMHSA
- Harborside Inc. Announces Departure of Chief Operating Officer, Greg Sutton
- The Law Offices of Frank R. Cruz Reminds Investors of Looming Deadline in the Class Action Lawsuit Against Triterras, Inc. f/k/a Netfin Acquisition Corp. (TRIT, TRITW)
- Mayor London Breed Announces Release of Five-Year Financial Plan for the City and County of San Francisco
- San Jose: San José Officials Reappoint Independent Police Auditor
In this session, attendees will learn how deception technology is used to gain rapid visibility and alert of in-network attackers. They will also gain insights into the value organizations are gaining by:
- Reducing dwell time by 90% by detecting and denying lateral movement
- Improving privilege access management by derailing unauthorized active directory (AD) queries
- Detecting and diverting credential theft and reuse
- Pinpointing and validation of insider threat activity (employees, suppliers, third parties)
- Securing Cloud Operations and malicious network activities
- Defending legacy devices and point of sale (POS) terminals from attack
- Detecting and hindering ransomware attacks
- Gathering of forensic evidence and adversary intelligence (IoCs/IoAs/TTPs) reducing triage time by 12X
- Enhancing EDR and SOAR solutions
WHEN: Wednesday, October 7, 2020, 1:00 PM - 1:40 PM EST
WHERE: The three-day 2020 RH-ISAC Cyber Intelligence Summit will be fully virtual.
More on The Californer
- California: Governor Newsom Issues Proclamation Declaring Dr. Martin Luther King, Jr. Day 1.15.21
- Alpha and Omega Semiconductor to Announce Fiscal Second Quarter 2021 Financial Results
- Regional Mexican stars Calibre 50 release compilation album "Las Numero 1 de Calibre 50"
- Mayor London Breed Announces Plan to Create Network of COVID-19 Vaccination Sites in San Francisco
- Simplr's Human Cloud Network Honored as One of Glassdoor's Top 50 Best Places to Work in 2021
To register for the event, visit https://summit.rhisac.org/rsvp/ and reserve your spot.
MEDIA: Tony Cole is available for interviews by request. If you are interested in expert commentary for any upcoming stories, please reach out to Matter Communications at PRAttivo@matternow.com.
Source: Attivo Networks
Filed Under: Security
0 Comments
Latest on The Californer
- Is the Beach So Last Year?
- Cotchett, Pitre & McCarthy Files Lawsuit Against Bank of America for Allegedly Failing to Protect the Accounts of Thousands of Unemployed Californians
- Aruba ClearPass Security Portfolio Receives Coveted Cyber Catalyst℠ Designation
- Asia-Pacific Contact Center Applications Market to See Buoyant Growth, Thanks to Analytics
- Consolidated Contracting Forms "Consolidated Building Health" Division to Effectively Control the Spread of Diseases in Senior Living Communities
- HAGENS BERMAN, NATIONAL TRIAL ATTORNEYS, Investigating Eos Energy Enterprises (EOSE) For Possible Securities Fraud in Light of Analyst Questions About Company's Customers, Encourages EOSE Investors to Contact Its Attorneys Now
- Motivational Fitness Radio Station Launches Hip Hop Rock
- California: Governor Newsom Announces Appointments 1.14.21
- San Jose: Media Advisory: Volunteers put the Community in Community Service
- 607th Consecutive Common Stock Monthly Dividend Declared By Realty Income
- California: Governor Newsom Announces Additional Security Actions in Advance of Presidential Inauguration
- "Diamond Fuji" to be Seen from TOKYO SKYTREE in February
- California: Governor Newsom Launches Transparency, Accountability and Assistance Measures in the State's Safe Schools for All Plan
- Port of Los Angeles Cargo Reaches 9.2 Million TEUs in 2020
- San Francisco: Mayor London Breed Announces $25 Million Early Education Economic Recovery Program
- Mayor London Breed Nominates Assessor Carmen Chu as San Francisco City Administrator
- 2U 15.1" Depth Rackmount Computer with 2 x Hot-Swap Hard Drive Trays - RMC5254
- Victorville Community Resource Center Named California HUD EnVision Center
- Green Stream Holdings Prepares for NE Solar Projects with New Production Space
- Texpak Offers Environmentally-Friendly Ecotach™ Fasteners to Address Sustainability Needs