Video On Demand
Drinking from the Tap: Network Security Monitoring
Jim Miller Miller
Daniel Twardowski
  • Multiple Speakers
  • Jim Miller Miller
  • Daniel Twardowski
Runtime: 23:54
In this session, two incident response (IR) consultants discuss what network security monitoring (NSM) is and how it can be used as part of a holistic approach to security. Concepts covered include an introduction to NSM, NSM tools that are publicly available, considerations in building your own NSM solution, Falcon network as a service (NaaS) and some examples of wins in IR situations where network security tools provided critical information.

Please provide your feedback and be entered to win $300 on items from the CrowdStrike Swag Store! Winner will be contacted via email.

Related Videos

Threat Hunting & Incident Response Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Tim Parisi CrowdStrike 19:25
Threat Hunting & Incident Response Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Multiple Speakers CrowdStrike 27:44
Threat Hunting & Incident Response Tales From the Crypt 2020: Case Studies in Ransomware
Multiple Speakers CrowdStrike 16:12