Available On Demand
With most organizations either on or moving to cloud services such as Office 365, the logical perimeter now extends beyond the network, providing external and internal attackers alike an easy means to gain access and misuse your organization’s most valuable data. With the threat surface extending from on-premises into the cloud, it’s critical to have visibility into activity – from infection to exfiltration, and everything in-between – across your entire environment.
So, what should you be looking out for to properly detect and respond to attacks?
In this educational webcast, join Microsoft MVP and regular IT Pro Today contributor, Nick Cavalancia, and Rich Langston from AlienVault, as they discuss:
- Understanding the threat: A look at the who, where, and how of attacks
- Detecting the threat: What detail gives IT the upper hand?
- Best practices on how to prevent, protect, and detect threats in a hybrid environment
If you have already registered, click here to access
Nick Cavalancia has over 25 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE and Master CNI. Nick has owned an MSP focused on the SMB, an enterprise IT consulting company, and today runs Techvangelism, where he serves the IT community as technical evangelist, working with some of the most recognized tech companies today. Nick has authored, co-authored and contributed to nearly two dozen books on Microsoft technologies, and regularly speaks, writes and blogs on a variety of topics.
Rich Langston Sr. Technical Product Marketing Manager at AlienVault