This resource is no longer available

Cover Image
Firewalls and endpoint agents only protect part of your risk surface. By leveraging several sources of network telemetry — including packets, flow logs, DNS logs, and more — security teams can take a multi-layered approach to visibility, threat detection, and investigation to defend cloud assets against advanced threats. Join (ISC)² and Extrahop on November 17 at 1:00 p.m. eastern / 10:00 a.m. pacific as we discuss Network Telemetry as a key component of an effective defense-in-depth strategy to enhance cloud security. We will explore best practices that enable your organization to identify indicators of compromise so you can investigate and respond to threats that successfully bypass perimeter and endpoint defenses.
Vendor:
Posted:
Nov 17, 2022
Premiered:
Nov 17, 2022, 13:00 EST (18:00 GMT)
Format:
Type:
Webinar

This resource is no longer available.