{"id":11863,"date":"2021-02-19T00:58:08","date_gmt":"2021-02-19T08:58:08","guid":{"rendered":"https:\/\/www.acalvio.com\/?p=11863"},"modified":"2021-02-19T00:58:08","modified_gmt":"2021-02-19T08:58:08","slug":"tales-from-the-trenches-effective-managed-cyber-threat-detection-and-response","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2021\/02\/19\/tales-from-the-trenches-effective-managed-cyber-threat-detection-and-response\/","title":{"rendered":"Tales from the trenches: Effective managed cyber threat detection and response"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;About this webinar&#8221; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h2><strong>About this webinar<\/strong>:<\/h2>\n<p>Whether you are defending a midsize or enterprise organization, youb\u0000\u0019re dealing with the reality that breaches can take minutes or less for a cybercriminal to execute but often months to discover. Outsourcing to close the gap between identifying a breach and taking action may make sense at this stage in your security practice, but not all Managed Detection and Response (MDR) programs are equally effective.<\/p>\n<p>Based on real-world experiences, our panel of experts will discuss what a successful shift to MDR can look like for midsize and enterprise organizations, and the program elements that are essential for your success.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Join us to learn&#8221; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||10px||false|false&#8221;]<\/p>\n<h2><strong>Join us to learn<\/strong>:<\/h2>\n<ul>\n<li>The value and importance of threat hunting and analysis in MDR<\/li>\n<li>The critical role of a Security Operations Center (SOC) in 24\/7 defense<\/li>\n<li>&#8211; The benefit of complementing a program with Deception to detect intrusions and protect what canb\u0000\u0019t be touched or patched quickly<\/li>\n<li>The advantage of integrating with Endpoint Detection and Response (EDR) for containment and action<\/li>\n<li>The edge that User Entity Behavior Analysis (UEBA) driven by machine learning and big data provides for detecting unknown threats<\/li>\n<li>And more<\/li>\n<\/ul>\n<p>Live online Feb 24 10:00 am PST<\/p>\n<h3>Speakers include:<\/h3>\n<p><strong>Scott Carter<\/strong>, Verizon Security Analytics<br \/>\n<strong>Mauricio Tellez Nava<\/strong>, VTRAC | Investigative Response<br \/>\n<strong>Surra Yanamadala<\/strong>, Field CTO, Acalvio<br \/>\n<strong>Tony Lee<\/strong>, VP, Global Services Technical Operations, Blackberry<br \/>\n<strong>Moderated by Jim Aull<\/strong>, Security Solutions Architect, Verizon[\/et_pb_text][et_pb_text admin_label=&#8221;REGISTER NOW&#8221; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;]<a href=\"https:\/\/www.brighttalk.com\/webcast\/15099\/464321\" target=\"_blank\" style=\"background-color:#A21D20;color:#ffffff;padding:12px 18px;font-size:1.5em;text-decoration:none;\" role=\"button\" rel=\"noopener noreferrer\">REGISTER NOW<\/a><\/button>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Verizon is hosting a panel discussion with Acalvio Technologies and Blackberry security experts on Feb 24th at 10 am pst. The focus will be on Managed Detection and Response and real-world examples in the SMB and enterprise markets.<\/p>\n","protected":false},"author":2,"featured_media":14994,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,8],"tags":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/11863"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=11863"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/11863\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/14994"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=11863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=11863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=11863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}