Skip to main content
shared header v2
Lucid Search Bar Implementation
Push Down Banner V1 Analytics Patch, remove after implementing V2 (S9 or S10)
Global nav V2 patch, remove after adding the mobile languages fix in the codebase (S7 or S8)

Best Practices for Scoping Infections and Disrupting Breaches


Infection and exploits will occur. The new goal is to prevent those infections from becoming a data breach. To do this successfully, security analysts need the ability to continuously collect, analyze, correlate and investigate a diverse set of data.

Watch this webinar to learn the specific data sources and capabilities required to determine the scope of an infection before it turns into a breach. See a live incident investigation that demonstrates this approach.

In this session, you will learn:

  • The capabilities required to distinguish an infection from a breach
  • The specific analysis steps to understand the scope of an attack
  • The data sources required to gain deep and broad visibility
  • What to look for from network and endpoint data sources


Monzy Merza
Head of Security Research

Watch Now