
Modernizing Threat Detection for Critical Infrastructure
Nation-state actors and cybercriminals are increasingly targeting critical digital infrastructure in complex environments like public utilities and service providers. Why? The combination of aging and unpatched systems with large volumes of siloed log data means that when the intruders break in, they can remain undetected for many months. And so stealthy threats like Salt Typhoon and Volt Typhoon go unnoticed.
It takes a distributed, multi-layered approach that correlates system and network telemetry as close to the source as computationally feasible to transform security environments like these. The good news is that this approach means that more breaches will be detected while reducing the computational load on the tools that are employed to do so centrally. Join Rajat Gulati, Leader of Product Management for Cisco Threat Detection and Response and The Register’s Tim Phillips to learn how Cisco achieves this with its customers.
In this session, we will cover:
- The value of federated data and federated analytics for large-scale deployments
- How correlating telemetry at the edge improves threat visibility
- The limitations of traditional log analysis in detecting covert attacks
- Cisco’s evolving strategy and innovations in its Breach Protection Suite
- Practical steps to make detection more actionable and cost-effective
Speakers:
Rajat Gulati, Director of Cisco XDR Product Management

Tim Phillips, The Register

View Now
* Required