How to Use Network Visibility for Deeper MITRE ATT&CK Coverage

Available On demand
Duration: 1 hour
Summary

This webinar will outline the critical role network detection and response plays in achieving MITRE ATT&CK Framework coverage, and how to use the network to detect late-stage attack tactics and stop the breach.

You will learn how network visibility provides detection and investigation options against late-stage attack activities catalogued in MITRE ATT&CK, including:

  • Lateral movement
  • Credential access
  • Command and control
  • Data exfiltration
Speakers
Chase Synder
Chase Synder
Partner Programme Manager
ExtraHop
Chase is ExtraHop’s Security Product Marketing Manager. Within cybersecurity, he focuses on data center analytics, virtualisation and big data. Prior to joining ExtraHop, he worked at eSentire, a leading managed detection and response provider.
Scott Register
Scott Register
VP, Product Management
Keysight Technologies
Scott leads Keysight’s Security Solutions Team. With experience spanning successful startups and global security companies, he has a proven record of developing innovative solutions - combining leading-edge technology with remarkable usability. He’s currently learning to love the smell of Clorox wipes.




By submitting your registration, you are providing Keysight with your personal data.

For information on how we use your personal data, and the choice you have, please review Keysight Privacy Statement link at the bottom of this page.

Learn more about our commitment to privacy:  Keysight Privacy Statement
©   Keysight Technologies