In this webinar with the SANS Institute, we cover real-world examples of advanced, targets cyber attacks, how they successfully evade legacy IDS and perimeter solutions, and how you can catch them.

You will learn how the key analytics capabilities of a next-gen, behaviour-based IDS allow you to detect advanced, targeted cyber attacks and other evasive attacks that are notably more difficult to find and prevent. These key analytics capabilities include:

  • Use of statistical, signature and anomaly detections
  • Detection, investigation, hunting, and alert management
  • Early cyber kill chain warning signals for threats, Indicators of Compromise (IoCs), attacks, and more
  • High fidelity forensic source data

Complete the form to watch it on demand!

Rezek and Andrey
Michael Rezek
VP Business Development and Cybersecurity Strategy

Michael leverages sales, strategy, and engineering experience to direct business case development involving multidisciplinary teams to translate technology and innovation into commercial enterprise value including M&A. His expertise includes Layer 2-7 network technologies; cybersecurity; and performance management. Michael holds a Bachelor’s degree in electrical engineering from Youngstown State University, and a Master’s degree in electrical engineering from the Georgia Institute of Technology. He is a former professionally-licensed engineer in multiple states, and is a published author of the Cisco Press book, "Building Multiservice Transport Networks."

 

 

Andrey Yesyev
Director of Cybersecurity Solutions

Before joining Accedian as the Director of Cybersecurity Solutions, Andrey spent nearly 6 years at IBM as a security engineer and a threat analytics architect working on QRadar Incident Forensics and DNS Analytics projects. He was also a part of the IBM team that supports collaboration with Quad9, a secure public DNS service which was created as a collaboration between PCH, IBM and the Global Cyber Alliance. With more than 10 years of experience in deep packet inspection and traffic analytics, Andrey placed 1st, 2nd, 3rd and 2nd in the Network Forensic Puzzle Contest at DefCon 21, 22, 23 and 24, respectively.