Automated Activity
or Insider Threat:
Can you Tell
the Difference?

Please join us for our upcoming attack simulation – “Automated Activity or Insider Threat: Can you Tell the Difference?”
Date: March 12th
Time: 1:00 PM EST

The Threat Stack Security Operations Center (SOC) regularly investigates suspicious activity on behalf of Threat Stack customers. Over the past several months, our security analysts have noticed a steady increase in the use of automation tools that include web-based SSH features.

This live demonstration will provide an in-depth look at how Threat Stack SOC Analysts investigate the downstream actions of automation tools when conducting forensics that require user attribution. Viewers will learn about the challenges often faced when investigating incidents involving automation tools, how you can overcome those challenges and how you can best prepare your security team for the increased usage of automation tools that include web-based SSH features.

Register now!