The approaches and goal of security have changed over the years. Previously, security was about preventing and stopping the adversary. Today, security has shifted to one main goal: control and reduce the amount of damage caused by the adversary. The area where most organizations are failing is timely detection. If an organization could identify the adversary early on in the compromise, the impact to the organization could be greatly reduced. The key to success is shift from reactive approaches like incident response to proactive approaches, most commonly referred to as, threat hunting. Learn how to find the adversary, control the damage, and minimize the impact to your organization.

Join SANS Top 20 Critical Controls Author and industry-recognized security expert, Dr. Eric Cole in this on-demand webinar, where he will cover the following discussion points:

1) Understand how adversaries compromise a Windows system

2) Method of finding and tracking adversaries

3) How to identify and reduce the dwell time of a compromise

4) Metrics that can be used to track the effectiveness of security controls

Photograph of Dr. Eric Cole

Dr. Eric Cole, World Renowned Cybersecurity Expert, CEO of Secure Anchor

World Renowned Cybersecurity Expert with more than 30 years of network security experience, Dr. Eric Cole is a distinguished cybersecurity expert and keynote speaker who helps organizations curtail the risk of cyber threats. Many of the foundational principles of this course and training in cybersecurity were developed by Dr. Cole. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker.

Prefers reduced motion setting detected. Animations will now be reduced as a result.