Often, a multitude of activities and signals occur between an initial intrusion and a data breach. Chris Martin explains why detecting early indicators, such as compromised credentials, command-and-control activity, or suspicious lateral movement, can often provide the necessary lead time to respond to and neutralize a threat before it leads to a material breach. Chris covers how organizations can use security intelligence and maturity modeling to reduce their time to detect (MTTD) and time to respond (MTTR).
This session is sponsored by LogRhythm.
Chris Martin is the principal sales engineer at LogRhythm. Chris has over 15 years’ experience in information technology in network administration, infrastructure, and security. He has provided consultancy services in both private- and public-sector organizations with focus on compliance and security.
©2016, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org