Link visible for attendees
In our September Heartland webinar, we’ll discuss how ransomware loitering presents an opportunity for network detection.
The recent surge of ransomware attacks has highlighted a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged, targeted approach. This shift in methodology presents threat groups with the opportunity to encrypt more critical data, but also presents security teams with the opportunity to detect activity before data is encrypted. In this talk we'll explore how security analysts use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
3:00pm - 3:05pm Welcome and Opening Remarks
3:05pm - 3:35pm Thought Leadership Spotlight
3:35pm - 3:50pm Audience Q&A
3:50pm - 4:00pm Prize Wheel and Closing Remarks
Steve Porcello, Sr. Sales Engineer at Gigamon
Steve started out as a security analyst for organizations in the New York City area, including some in the industrial, utility and financial services sectors. From there, he moved into the vendor space by joining innovative cyber security start-ups. He is now focused on using his experiences in incident response to promote and educate security teams about the benefits of Gigamon ThreatINSIGHT.
Quintin Niall, Sr. Staff Technical Account Manager
Quintin is a Sr. Staff Technical Account Manager, currently helping ThreatINSIGHT customers leverage NDR for custom detection and threat hunting. Since joining ICEBRG (acquired by Gigamon in 2018), he has deployed many network sensors into compromised environments, including aerospace, finance, and retail networks. He holds a BS in Computer Science and is currently earning a Graduate Certificate in Advanced Computer Security from Stanford University.