GuidePoint Security

on-demand webcast:

Webcast: 

Can I use machine learning to automate the network hunt?

00
00
00
00

Red. Set. Go!

Red. Set. Go!

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

RegisterRegisterS'inscrireRegistrierenWatch On-Demand

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

RegisterRegisterS'inscrireRegistrierenWatch On-Demand

In Collaboration with:

En collaboration avec:

In Zusammenarbeit mit:

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

RegisterRegisterS'inscrireRegistrierenWatch On-Demand

Can I use machine learning to automate the network hunt?

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

RegisterRegisterS'inscrireRegistrierenWatch On-Demand

In Collaboration with:

En collaboration avec:

In Zusammenarbeit mit:

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

RegisterRegisterS'inscrireRegistrierenWatch On-Demand

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

RegisterRegisterS'inscrireRegistrierenWatch On-Demand

In Collaboration with:

En collaboration avec:

In Zusammenarbeit mit:

On-Demand Webcast

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

In this discussion, we present a new way of thinking about network threat hunting and AI. The common practice today is that most analysts search for attackers based on threat intelligence, signature rules passed between organizations and hunches.  This requires labor intensive processes that are dependent on individual analysts and result in inconsistency in execution. This is an opportunity for attackers.

This discussion proposes an approach that holistically thinks about threat hunting from initial signals to closure; and how to create automated and repeatable patterns for a security team. Breaking from the usual threat hunting techniques centered around an analyst’s manual signature rule management and rule creation from threat intelligence, knowledge, and hunches. Instead evidence-based security research is used to train machine learning algorithms to provide vision and efficiency without significant labor and risking human error.

Yes, yes, we know, filling out forms is painful. But staring at empty boxes is even more painful and doesn’t reserve your place at this event.Keep in mind the form may not load if you are using an ad blocker.

Oui, oui, nous savons, remplir des formulaires est douloureux. Mais regarder des boîtes vides est encore plus pénible et ne vous réserve pas votre place à cet événement. N'oubliez pas que le formulaire risque de ne pas se charger si vous utilisez un bloqueur de publicité.

Ja, wir wissen, dass es mühsam ist, Formulare auszufüllen. Aber mit einer leeren Box zu starten, ist noch mühsamer. Also bitte akzeptieren Sie die Cookies, sodass Sie bereits vorausgefüllte Felder sehen.

Vectra needs the information you provide to us to process your inquiry and to contact you about our products. You may unsubscribe from these communications at anytime. For more information check out our Privacy Policy.

Vectra a besoin des informations que vous nous fournissez pour traiter votre demande et vous contacter à propos de nos produits. Vous pouvez vous désabonner de ces communications à tout moment. Pour plus d'informations, consultez notre politique de confidentialité.

Vectra benötigt die Informationen, die Sie uns zur Verfügung stellen, um Ihre Anfrage zu bearbeiten und Sie bezüglich unserer Produkte zu kontaktieren. Sie können diese Mitteilungen jederzeit abbestellen. Weitere Informationen finden Sie in unseren Datenschutzbestimmungen.

Vectra behöver den information du tillhandahåller oss för att behandla din förfrågan och för att kontakta dig kring våra produkter. Du kan avsluta prenumerationen på denna kommunikation när som helst. För mer information, se vår sekretesspolicy.

Agenda

Speaker(s)

Modérateur(s)

Vortragende

Jean-Paul Bergeaux
Jean-Paul Bergeaux
Federal CTO
,
GuidePoint
With more than 22 years of experience in the Federal technology industry, Jean-Paul Bergeaux is currently the Federal CTO for GuidePoint Security. Jean-Paul’s career has been marked by success in technical leadership roles with ADIC (now Quantum), NetApp and Commvault and SwishData. Jean-Paul focuses on identifying customers’ challenges and architecting innovative solutions to solve their complex problems. He is also a thought leader on topics that are top of mind for Federal IT Managers like Cyber Security, Cloud, Big Data, and Business Continuity
Marcus Hartwig
Marcus Hartwig
Senior Product Manager
,
Vectra
Marcus Hartwig is a senior product marketing manager at Vectra. Has been active in the areas of IAM, PKI and enterprise security for more than two decades. His past experience includes product marketing at Okta, co-funding a company in cybersecurity professional services, as well as managing a security product company – a combination that has left him passionate about all parts of product marketing, design and delivery.
,
,

Location and date

Lieu et date

Ort und Datum

Address
Adresse
Addresse
Date and time
Date et heure
Datum und Uhrzeit

In Collaboration with:

En collaboration avec:

In Zusammenarbeit mit:

GuidePoint Security
GuidePoint Security
Founded in 2011 by cyber security industry veterans, GuidePoint is a trusted security expert for our customers, for both security technologies and professional services. We are different because of our organizational structure, technological expertise, unrivaled customer service, and a vendor-agnostic approach. This allows them to provide the best security services and solutions possible.
Visit website