Webinars

Threat intelligence

95 vues
How to effectively detect, prevent & respond to threats with threat intelligence

The threat landscape is changing rapidly. It’s becoming incredibly challenging to effectively respond to emerging complex and advanced cyberthreats without a 360-degree view of the tactics, techniques and procedures used by threat actors. Immediate access to relevant and reliable threat intelligence (TI) makes your incident response and SOC teams more efficient and effective, arming them with the threat context required to quickly respond to cyberattacks.
In this webinar, you will see a demonstration of the incident investigation process with the help of different Kaspersky threat intelligence services. Kaspersky experts will present:
• How to validate specific suspicious activities or artefacts
• Analyses of the relationships between objects to see the attack spread path
• How to get more context about observables and understand if they can be attributed to a known threat actor
• How relevant TI context can speed up incident response process

Related videos

Webinars

Webinar - Threat Intelligence : comment la vision unique...

84 vues 05-07-2023

Les connaissances et l'expérience approfondies de Kaspersky dans tous les domaines de la...

Webinars

Découvrez le SIEM NextGen Kaspersky

189 vues 23-06-2023

Kaspersky Unified Monitoring and Analysis Platform (KUMA) est une solution de gestion de...

Solutions

Webinar - Duo EPP/EDR : les conditions d’une combinaison...

321 vues 07-06-2023

Une technologie Endpoint Detection and Response (EDR) performante vous permettra notamment...

Solutions

Threat Intelligence

196 vues 18-04-2023

Le suivi, l'analyse, l'interprétation et la lutte contre les menaces informatiques représentent...

Webinars

Tactiques de négociation des groupes de ransomware (anglais)

38 vues 27-03-2023

Les cybercriminels ont tendance à être discrets et à agir sans révéler leur identité. Cependant,...

Webinars

Webinar - Protection des systèmes industriels

62 vues 23-03-2023

Les cyberattaques malveillantes contre les systèmes industriels, notamment les systèmes...