3:00 PM – 3:30 PM ET
Visibility and context is critical to threat investigations and reducing risk in today’s enterprise. RiskIQ’s Investigator application brings Internet-wide enrichment and context to endpoint interactions, therefore accelerating incident response and proactive security investigations.
Being able to quickly triage, enrich, and investigate threats to an organization and the malicious infrastructure associated with them is key to identifying, blocking, and preventing current and future attacks.
In this session you will learn how to leverage RiskIQ Investigator combined with the CrowdStrike Falcon Platform to dramatically accelerate your threat investigations and reduce your time to remediation.
- Get complete visibility and inside and outside your network
- Accelerate your endpoint investigations with RiskIQ’s internet-wide visibility and enrichment data
- Identify and proactively block all threat infrastructure being used by the attackers
Over the past few years, ransomware has become one of the most gripping headlines in cybersecurity. The public sector has been on the forefront of the dialogue, with cities impacted to the tune of hundreds of millions of dollars across the United States alone. This is compounded by inconsistent policies on paying ransomware, unreliable backups for digital assets, and lack of visibility across various networks. While ransomware is a critical risk to traditional IT networks, very few organizations have examined how it may impact their more critical operational technology (OT) environments and industrial control systems (ICS). Public utilities, water and power in particular, have unique concerns when it comes to operations and reliability. This session will highlight the concerns with ransomware in the public sector, particularly with OT systems, as well as share some strategies and trends from recent ransomware events, using real-world examples and use cases.
Digital transformation, cloud-first, and mobile-first security strategies are impacting every government agency across the United States, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can government agencies manage the risk of what they cannot control or see?
In this session governments will learn:
- How mobilization and digital transformation are impacting security strategy across government offices
- How and why government agencies should move Network Security and Data Protection in the Cloud
- By adopting Secure Access Service Edge (SASE) government offices can provide the opportunity to completely rethink their network strategy