Governance & Risk Management , Next-Generation Technologies & Secure Development

Bridging the Gap Between Breach Prevention and Incident Response

Bridging the Gap Between Breach Prevention and Incident Response

The threat landscape has evolved, but security investments have largely remained the same. A disproportionate percentage of budgets are spent on prevention, yet targeted attacks and advanced threats can easily evade these controls.

Attend this webinar and hear from special guest speaker Rick Holland, Forrester Research's Principal Analyst, as he joins Damballa CTO Brian Foster to discuss ways to shift focus and dollars from prevention to detection and response to give you the best defense against today's threats.

Discussion topics include:

  • Security for today's targeted attacks and advanced threats;
  • Shifting focus from prevention to detect and respond methods;
  • How to use automated breach defense for rapid response.


Today's advanced threat landscape is growing, with the variety of attacks far outnumbering security controls most enterprises need to effectively prevent compromises. News headlines read like a who's who of corporate enterprises - Target, Neiman Marcus, New York Times, and Lockheed to name a few. No matter what the attacks are called - advanced persistent threats (APT), advanced malware, or targeted attacks - today's prevention-based security will eventually fail to detect them and allow infections to penetrate the defensive walls. And with today's mobile workforce, devices are more likely to be compromised off network. Rapidly finding, tracking and mitigating the compromised devices before a data breach or theft of intellectual property is paramount.

Cyber threats will always be asymmetrical to our IT security, since threat actors will always have the first move. The traditional approach of looking for malware signatures or filtering bad web URLs are easily evaded. Experts now recommend a different approach to only relying on prevention-based security; a "detect and respond" layer is also necessary. Detecting infected devices by monitoring the network and focusing on situations that present significant danger becomes the security team's top priority, and mitigating risk from breaches becomes the driver for IT security investments.

Webinar Registration

This webinar is available OnDemand.

View Now

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.