Presented by Dave Kennedy, Chief Technology Officer at Binary Defense
Crowd-sourced intelligence in detecting and responding to security threats is no longer enough. Attackers are now able to bypass these more traditional, static methods. Security teams need to identify suspicious behaviors and patterns as a baseline approach in preventing and detecting attacks.
Join Dave Kennedy as he walks us through:
- What attackers are doing to circumvent traditional detection
- Why detections need to shift to focus more on behavior
- How you can build these types of detections into your own security initiatives