Discovering a breach after the malware has had time to corrupt your systems is bad. First hearing about a breach from customers or the FBI is even worse. In either case, the pressure to know what happened, to whom, and how many were affected couldn’t be greater.
Preparation reduces the time required to resolve the breach, and includes access to network packets that may contain the malware. That preparation also means knowing how to use those packets most effectively.
In this video, Savvius and renowned security investigator, Keatron Evans, present strategies for storing the network packets you need and how to effectively use the information.