CYBER SUMMER WITH CURRY, EPISODE 4: EDR OR XDR?

ON DEMAND

Endpoint detection and response (EDR) technologies can provide effective threat detection and protection, so why are we increasingly hearing about Extended Detection and Response (XDR) as the latest new trend?

Sam Curry looks back at this panel discussion in which he, Cybereason CISO, Israel Barak, and Forrester Security and Risk Research Analyst Allie Mellen discussed:

  • What is Extended Detection and Response technology?
  • How have attackers and their campaigns changed over the past 18 months?
  • Can XDR help me stop ransomware and targeted cyber attacks?
  • How are organisations using XDR for security operations today?
  • When should I consider XDR over EDR, SIEM, or SOAR technologies? 

WATCH ON DEMAND

Meet The SPEAKERS

Sam Curry

Sam Curry

CSO, Cybereason

Sam Curry has over 25 years of IT security industry experience and is a Visiting Fellow at the National Security Institute. Sam most recently served as CTO, CSO and GM at Arbor Networks. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management roles, including CTO, SVP of Product and Head of RSA Labs. In addition to other media. Sam has also held senior management roles at Microstrategy, Computer Associates, and McAfee in addition to co-founder and first employee of two successful security startups.

ISRAEL-HS-HEX

Israel Barak

Chief Information Security Officer, Cybereason

Israel Barak, CISO, is a cyber defense and warfare expert, with extensive background working for the government where he established and operated various cyber warfare teams. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.

Allie Mellen

Allie Mellen

Risk Research Analyst, Forrester Security

Allie supports security and risk professionals, covering security infrastructure and operations to assist clients in building and maturing their threat detection and response strategies. Her coverage includes the people, processes, and tools of the security operations center (SOC); security analysts; security information and event management (SIEM); security user behavior analytics (SUBA); security analytics (SA); security orchestration, automation, and response (SOAR); endpoint detection and response (EDR); extended detection and response (XDR); and SOC metrics. Her research focuses on the current state and evolution of analytics, detection, automation, and response in security.