3 Flaws with the Defense in Depth Security – Register

Webminar – registration:

3 Flaws with the Defense in Depth Security Model and How to Improve It

 Join us on Thursday, July 20th at 2 pm ET Join us on Thursday, July 20th at 2 pm ET

Infocyte is partnering with Crowd Research Partners for a webinar on ‘The 3 Flaws with the Defense in Depth Security Model and How to Improve It’ on Thursday, July 20th at 2 pm ET | 1 pm CT | 11 am PT | 6 pm GMT. Cybersecurity experts explore why the current defense in depth model leaves critical gaps which allow attackers to remain undetected.

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly, a better approach is needed. During this webinar, Chris Gerritz, Infocyte’s Founder and the former Chief of Defensive Counter Cyberspace Operations for the U.S. Air Force AFCERT team, will discuss:

  • The Defense in Depth model from an attacker kill chain perspective
  • Why defense is important, but it is not the only factor to deliver security
  • Where threat hunting and post-compromise detection fit in the model

DATE & TIME: July 20 at 2 pm ET | 1 pm CT | 11 am PT | 6pm GMT

If you can’t make it to the live webinar, please register and we will make an on-demand version of the event available to you.

We look forward to seeing you at the webinar!

See Infocyte HUNT in Action. Request a Live Demo.

Request a Live Demo of Our Award-winning Threat Hunting and Incident Response Platform.

More from our blog

cybersecurity siem alert validation fatigue

Security Brief: SIEM Alert Validation and the Dangers of Alert Fatigue

March 27, 2019

Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »