When we hear the stories from our customers or our security researchers who have responded to some of the world’s most consequential threats, they tell us that there are a consistent set of questions that they need to initially answer for a given scenario. These are the hypotheses they test in order to determine the right haystack in which to look for the proverbial needle.
The first step – is to make sure that the attributes necessary to answer these questions are readily available to the analyst. In this session, you will learn about:
- Considerations when choosing the right data format
- Pitfalls and challenges when deploying your data collection architecture
- The sources of data for forensics purposes and key pitfalls when building visibility into your network
- The attributes that need to be available in order to properly conduct an investigation
Register to watch the on-demand replay.