Leverage Modern Network Forensics to Protect Your Data with guest Keatron Evans
Thursday, December 18, 10:00 am PST
As attackers and attack vectors have evolved, more and more evidence pertaining to breaches and data exfiltration attacks exist only in traffic. In this presentation we'll discuss the newest attacks and demonstrate the attacks and associated network forensics to piece together how the attacks happened. We'll look at common "browse by" hacks, rootkit based exfiltration, and covert channel communications as the attack vectors and how to investigate them.
Our support forums are a great first place to look if you have a support question. If you don't see the answer to your question, you can post it and one of our technical support staff will get back to you as soon as possible.