Innovation in the field of cybersecurity technology provides us with a steady stream of tools which enable organizations to create environments which are less favorable for adversaries to succeed. Over the years successful cybersecurity leaders have implemented tools leveraging machine learning based artificial intelligence which automate processes that increase accuracy and improve efficiency, as well as behavioral based technologies to monitor anomalous network behavior to detect malicious external or insider behavior. During this panel, we will explore these and other technologies which can reduce dwell time, give organizations time to respond to attacks before data is exfiltrated, and ultimately make an organization's network a less desirable target.
Auditorium Borderless Cyber USA / Washington D.C. / 3-5 October 2018 jharnad@oasis-open.orgInnovation in the field of cybersecurity technology provides us with a steady stream of tools which enable organizations to create environments which are less favorable for adversaries to succeed. Over the years successful cybersecurity leaders have implemented tools leveraging machine learning based artificial intelligence which automate processes that increase accuracy and improve efficiency, as well as behavioral based technologies to monitor anomalous network behavior to detect malicious external or insider behavior. During this panel, we will explore these and other technologies which can reduce dwell time, give organizations time to respond to attacks before data is exfiltrated, and ultimately make an organization's network a less desirable target.