DETECTION & RESPONSE
Vectra Webinar | Thursday 9 July | 10h-11h
Today, attackers typically aim to either exfiltrate an organisation’s critical data or to severely disrupt its business. Sophisticated well skilled attackers often use advanced malware-based espionage that can aggressively pursue and compromise specific targets as an entry point. These initial compromises can be planted via social engineering tactics, such as spear-phishing attempts or watering hole techniques.
Once a compromise has occurred, attackers attempt to maintain a persistent presence within the victim’s network, escalate privileges and move laterally within the victim’s network to extract sensitive information to locations under the attacker’s control. This so called dwell time, where an attacker remains undetected, often spans over more than 100 days.
Vectra’s Cognito security analytics platform aims to address modern attacks by analysing an attacker's behaviour of which many phases are outlined in MITRE’s ATT&CK framework, a well-documented industry model that describes an attack campaign and its phases.
In this webinar we introduce you to today's security challenges, provide an overview of the Vectra AI solution, how it analyses the attack cycle and leverages attack behaviour based machine learning models using enriched network metadata.
- Today’s security challenges, persistent attacks
- Review Vectra’s approach leveraging attack behaviour models