While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.
As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join us, as they cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.
- Challenges and keys to minimizing the detection to recovery timeframe
- Real-world examples of how minimizing the timeframe averted disaster including:
- An attacker attempting to deploy a Monero cryptocurrency miner
- A nation-state attacker trying to disrupt a citizenship change
- An advanced persistent threat that required increased visibility to eradicate
- A timeline perspective of what the potential impact to the clients could have been and compliance implications
- Best practices going forward
Brent Feller, Senior Solutions Engineer, eSentire