Drinking from the Tap: Network Security Monitoring
- Multiple Speakers
- Jim Miller Miller
- Daniel Twardowski
Runtime: 23:54
In this session, two incident response (IR) consultants discuss what network security monitoring (NSM) is and how it can be used as part of a holistic approach to security. Concepts covered include an introduction to NSM, NSM tools that are publicly available, considerations in building your own NSM solution, Falcon network as a service (NaaS) and some examples of wins in IR situations where network security tools provided critical information.
Please provide your feedback and be entered to win $300 on items from the CrowdStrike Swag Store! Winner will be contacted via email.
Related Videos
Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Threat Hunting & Incident Response
Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Tim Parisi
CrowdStrike
19:25
Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Threat Hunting & Incident Response
Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Multiple Speakers
CrowdStrike
27:44
Tales From the Crypt 2020: Case Studies in Ransomware
Threat Hunting & Incident Response
Tales From the Crypt 2020: Case Studies in Ransomware
Multiple Speakers
CrowdStrike
16:12
{Will be replaced by the modal content}