Click here to register

Date: 25th June 2014 
Time: 2:00 p.m. - 3:00 p.m. BST

Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX).  See how you can use these technologies to create an audit trail of network activity. Understand how to analyse the data so that you can: 

  • Uncover anomalous traffic
  • Discover active attacks in each phase of the attacker's kill chain.
  • Determine the scope of successful breaches and document the timeline of the attack
  • Accelerate incident response and improve forensic investigations

Speakers: Tom Cross, Director of Security Research, Lancope

                 Javvad Malik, Senior Analyst, Enterprise Security, 451 Research