The approaches and goal of security have changed over the years. Security was once about preventing and stopping the adversary. Today, security has shifted to one main goal: control and reduce the amount of damage caused by the adversary. The area where most organizations are failing is timely detection. If an organization could identify the adversary early on in the compromise, the impact to the organization could be considerably reduced. The key to success is to shift from reactive approaches like incident response, to proactive approaches, most commonly referred to as threat hunting.
Join SANS Top 20 Critical Controls Author and industry-recognized security expert, Dr. Eric Cole in this upcoming webinar, where he will explore:
- How adversaries compromise a Windows system
- Methods of finding and tracking adversaries
- How to identify and reduce the dwell time of a compromise
- Metrics that can be used to track the effectiveness of security controls
Join Dr. Eric Cole and learn how to find the adversary, control the damage, and minimize the impact to your organization.
World Renowned Cybersecurity Expert with more than 30 years of network security experience, Dr. Eric Cole is a distinguished cybersecurity expert and keynote speaker who helps organizations curtail the risk of cyber threats. Many of the foundational principles of this course and training in cybersecurity were developed by Dr. Cole. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker.