3 Flaws with the Defense-in-Depth Security Model and How to Improve It
Network Intrusions Have Spiked in Recent Years
Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly, a better approach is needed.
In this on-demand webinar, you’ll learn why the current defense in depth model, as it is applied in many organizations, leaves critical gaps which allow attackers to remain undetected. Chris Gerritz, Infocyte’s Founder and the former Chief of Defensive Counter Cyberspace Operations for the U.S. Air Force AFCERT team, discusses:
- The Defense-in-Depth model from an attacker kill chain perspective
- Why defense is important, but it is not the only factor to deliver security
- Where threat hunting and post-compromise detection fit in the model
Learn why the current Defense-in-Depth model, as it is applied in many organizations, leaves critical gaps which allow attackers to remain undetected. Explore the MITRE ATT&CK Model and how threat hunting and post-compromise detection address gaps to better protect your critical IT and data.