Protecting critical digital infrastructure in complex environments

Using detection at source to transform security


Webcast_protecting_critical_digital

Nation-state actors and cybercriminals are increasingly targeting critical digital infrastructure in complex environments like public utilities and service providers. Why? The combination of aging and unpatched systems with large volumes of siloed log data mean that when the intruders break in, they can remain undetected for many months. And so stealthy threats like Salt Typhoon and Volt Typhoon to go unnoticed.

It takes a distributed, multi-layered approach that correlates system and network telemetry as close to the source as computationally feasible to transform security environments like these. The good news is that this approach means that more breaches will be detected while reducing the computational load on the tools that are employed to do so centrally. Join Rajat Gulati, Leader of Product Management for Cisco Threat Detection and Response and The Reg’s Tim Phillips to learn how Cisco achieves this with its customers.

In this session, we will cover:

  • The value of federated data and federated analytics for large-scale deployments
  • How correlating telemetry at the edge improves threat visibility
  • The limitations of traditional log analysis in detecting covert attacks
  • Cisco’s evolving strategy and innovations in its Breach Protection Suite
  • Practical steps to make detection more actionable and cost-effective