Can I use machine learning to automate the network hunt?

00
00
00
00

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

Register

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

Register

In Collaboration with:

In Zusammenarbeit mit:

En collaboration avec:

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

Register

Can I use machine learning to automate the network hunt?

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

Register

In Collaboration with:

In Zusammenarbeit mit:

En collaboration avec:

Wednesday, April 29

11 a.m. PDT | 1 p.m. CDT | 2 p.m. EDT

In this discussion, we present a new way of thinking about network threat hunting. The common practice today is that most analysts search for attackers based on threat intelligence, signature rules passed between organizations and hunches.  This requires labor intensive processes that are dependent on individual analysts and result in inconsistency in execution. This is an opportunity for attackers.

This discussion proposes an approach that holistically thinks about threat hunting from initial signals to closure; and how to create automated and repeatable patterns for a security team. Breaking from the usual threat hunting techniques centered around an analyst’s manual signature rule management and rule creation from threat intelligence, knowledge, and hunches. Instead evidence-based security research is used to train machine learning algorithms to provide vision and efficiency without significant labor and risking human error.

Can't make it? Register to receive an on-demand replay of the session.

Yes, yes, we know, filling out forms is painful. But staring at empty boxes is even more painful and doesn’t reserve your place at this event. Keep in mind the form may not load if you are using an ad blocker.

Ja, wir wissen, dass es mühsam ist, Formulare auszufüllen. Aber mit einer leeren Box zu starten, ist noch mühsamer. Also bitte akzeptieren Sie die Cookies, sodass Sie bereits vorausgefüllte Felder sehen.

Oui, oui, nous savons, remplir des formulaires est douloureux. Mais regarder des boîtes vides est encore plus pénible et ne vous réserve pas votre place à cet événement. N'oubliez pas que le formulaire risque de ne pas se charger si vous utilisez un bloqueur de publicité.

Vectra needs the information you provide to us to process your inquiry and to contact you about our products. You may unsubscribe from these communications at anytime. For more information check out our Privacy Policy.

Vectra benötigt die Informationen, die Sie uns zur Verfügung stellen, um Ihre Anfrage zu bearbeiten und Sie bezüglich unserer Produkte zu kontaktieren. Sie können diese Mitteilungen jederzeit abbestellen. Weitere Informationen finden Sie in unseren Datenschutzbestimmungen.

Vectra a besoin des informations que vous nous fournissez pour traiter votre demande et vous contacter à propos de nos produits. Vous pouvez vous désabonner de ces communications à tout moment. Pour plus d'informations, consultez notre politique de confidentialité.

Agenda

Presenter(s)

Vortragende

Modérateur(s)

Jean-Paul Bergeaux
Jean-Paul Bergeaux
Federal CTO, GuidePoint Security
With more than 22 years of experience in the Federal technology industry, Jean-Paul Bergeaux is currently the Federal CTO for GuidePoint Security. Jean-Paul’s career has been marked by success in technical leadership roles with ADIC (now Quantum), NetApp and Commvault and SwishData. Jean-Paul focuses on identifying customers’ challenges and architecting innovative solutions to solve their complex problems. He is also a thought leader on topics that are top of mind for Federal IT Managers like Cyber Security, Cloud, Big Data, and Business Continuity
Marcus Hartwig
Marcus Hartwig
Senior Product Marketing Manager
Marcus Hartwig is a senior product marketing manager at Vectra. Has been active in the areas of IAM, PKI and enterprise security for more than two decades. His past experience includes product marketing at Okta, co-funding a company in cybersecurity professional services, as well as managing a security product company – a combination that has left him passionate about all parts of product marketing, design and delivery.

Location and date

Ort und Datum

Lieu et date

Address
Addresse
Adresse
Date and time
Datum und Uhrzeit
Date et heure

In Collaboration with:

In Zusammenarbeit mit:

En collaboration avec:

GuidePoint Security: Government Solutions
GuidePoint Security: Government Solutions
Founded in 2011 by cyber security industry veterans, GuidePoint is a trusted security expert for our customers, for both security technologies and professional services. We are different because of our organizational structure, technological expertise, unrivaled customer service, and a vendor-agnostic approach. This allows them to provide the best security services and solutions possible.
Visit website