Threat detection solutions come in many forms; extended detection and response (XDR), endpoint detection and response (EDR) and network detection and response (NDR). When it comes to detecting threats to an organization each of these “DRs” identifies specific elements of an attack path, but they may be lacking visibility into application-specific threats because these solutions see an application as a “black-box”. This session covers Application detection and response (ADR) solutions which look for vulnerabilities and exploits within the application itself. Key takeaways: - Understand how ADR observes and analyses applications bringing visibility and context down to the code level. - How to contrast ADR with application layer coding verification mechanisms such as RASP, SCA, SAST and DAST. - Understand how ADR differs from deploying a WAF or CNAPP solution. - Learn how ADR observations and context can be integrated with the other ”DRs” to build a more complete picture of an attack to ensure an end-to-end response. About the Speaker Natalie is a Security and Compliance Consultant that has been involved in security technologies for more than 20 years. Natalie has advisory and engineering experience in multi-vendor network security architecture and deployment, security compliance and governance, security analytics and threat detection and response. Natalie was a former Program Leader for the CCIE Security certification track and has been a keynote speaker at various Cybersecurity events both in the US and Australia. Natalie is also a three-time Cisco Distinguished Speaker award winner, a published author with Cisco Press and a freelance technical writer and presenter.

Hora

08:00 - 09:00 hs GMT+1

Organizador

Information Security
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Julio / 2025 366 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 30 de Julio de 2025
Mar 01 de Julio de 2025
Mié 02 de Julio de 2025
Jue 03 de Julio de 2025
Vie 04 de Julio de 2025
Sáb 05 de Julio de 2025
Dom 06 de Julio de 2025
Lun 07 de Julio de 2025
  • SonicPlatformでセキュリティ管理を簡単に

    02:00 - 03:00 hs GMT+1

    Fecha
    Lun 7-Jul-2025, 02:00 - 03:00 hs GMT+1
    Descripción
    MSPの皆様、究極の管理ソリューションをご覧ください。SonicWallのSonicPlatformで、すべてのデバイスの管理を、すべての場所で、すべての顧客に対して、単一の強力なコンソールから統合して効率化できます。 SonicPlatformはMSP専用に開発されており、複数のテナントやクライアントにわたってSonicWallのサイバーセキュリティツールを簡単にプロビジョニング、監視、制御できます。単一のダッシュボードで、ワークフローのシンプル化、応答時間の短縮、環境全体の完全な可視化が可能です。脅威に対する備えと運用の最適化のために、AIを利用したインサイトが活用されます。 SonicPlatformは、MSPがセキュリティを効率的に、シームレスに、大規模に管理する方法に変革をもたらしています。 いくらなんでも、そんなにいい話はないと思われた方は、この特別なCAFÉ TECHセッションで実際にご確認ください。きっと、ご覧になった後にはセキュリティ管理機能を強化する準備にとりかかるはずです!
    Cerrar
  • Simplify Security Management with SonicPlatform

    04:30 - 05:00 hs GMT+1

    Fecha
    Lun 7-Jul-2025, 04:30 - 05:00 hs GMT+1
    Descripción
    MSPs, meet the ultimate management solution. With SonicPlatform from SonicWall, you can unify and streamline the management of all devices across all locations for all customers—entirely from a single, powerful console. Built specifically for MSPs, SonicPlatform makes it effortless to provision, (...)
    Cerrar
Mar 08 de Julio de 2025
Mié 09 de Julio de 2025
Jue 10 de Julio de 2025
Vie 11 de Julio de 2025
Sáb 12 de Julio de 2025
Dom 13 de Julio de 2025
Lun 14 de Julio de 2025
Mar 15 de Julio de 2025
Mié 16 de Julio de 2025
Jue 17 de Julio de 2025
Vie 18 de Julio de 2025
Sáb 19 de Julio de 2025
Dom 20 de Julio de 2025
Lun 21 de Julio de 2025
Mar 22 de Julio de 2025
Mié 23 de Julio de 2025
Jue 24 de Julio de 2025
Vie 25 de Julio de 2025
  • UNC3886 Threat Intelligence Briefing

    05:00 - 06:00 hs GMT+1

    Fecha
    Vie 25-Jul-2025, 05:00 - 06:00 hs GMT+1
    Descripción
    Join Google Cloud Security Threat Intelligence Analyst Yihao Lim, for a threat briefing on UNC3886, the sophisticated cyber espionage group recently identified as targeting national critical information infrastructure. We will explore: - The unique characteristics that define UNC3886's attack campaigns. - Common vulnerabilities (...)
    Cerrar
  • Risky Business - Securing AI

    15:00 - 16:00 hs GMT+1

    Fecha
    Vie 25-Jul-2025, 15:00 - 16:00 hs GMT+1
    Descripción
    This webinar explores the frameworks and tools to assess cybersecurity risks in artificial intelligence systems with a focus on agentic AI solutions. We’ll explore how existing controls may need to adapt for this sea change in user and data workflows. (...)
    Cerrar
Sáb 26 de Julio de 2025
Dom 27 de Julio de 2025
Lun 28 de Julio de 2025
Mar 29 de Julio de 2025
Mié 30 de Julio de 2025
Jue 31 de Julio de 2025
Vie 01 de Julio de 2025
Sáb 02 de Julio de 2025
Dom 03 de Julio de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado