We are changing for you!
Placing orders is currently unavailable.
Please contact-us to place an order or quote for services.
Use Case Workshop: How to Hunt Insider Threats
WGAC-CSC-UCWIT
Schedule
Description
Use Case Workshops are hands-on, instructor-led courses focused on specific use case outcomes in Cisco Stealthwatch® Enterprise. The workshops are designed to help you quickly identify and investigate common threats and to provide effective workflows so that you can fully understand Stealthwatch capabilities.
In this workshop, you'll work through a series of activities that focus on hunting for insider threats using Cisco Stealthwatch Enterprise. This workshop will help you identify network behaviors that indicate threats posed by malicious, negligent, or compromised insiders. A lab environment will show you how to use Stealthwatch to detect them. At the end of the workshop, you'll learn best practices for protecting your organization from insider threats.
This workshop is intended to be interactive and engaging. You are encouraged to ask questions, respond to questions, and share best practices and ideas.
After taking this workshop, you should be able to:
- Identify insider threat behavior.
- Detect unauthorized network traffic for bad (not good) behavior.
- Use Stealthwatch tools to detect potential insider threats.