Skip to content

Details

  • New-age cyberthreats and how to prevent them.
  • Using user and entity behavior analytics to identify malicious insider threats.
  • Real-time analytics and alerts in mitigating threats.
  • Turning to the MITRE ATT&CK framework for threat detection.
  • Remediating threats using automated incident response mechanism.
  • Managing incidents using a dedicated incident management console.

Members are also interested in