Implementing and Using XDR to Improve Enterprise Cybersecurity

Security operations teams are taking a hard look at extended detection and response tools – XDR – as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology work? What tools does it require, and what skills do you need to have to use it in your enterprise? In this panel discussion, top experts will discuss the benefits of XDR, the challenges in implementing it, and details on how to implement XDR technology to speed the detection and mitigation of new exploits.

On Demand
1h 00min

Attend this webinar and you'll:

  • Be able to better assess how XDR fits best with your organization's comprehensive security strategies.
  • Find new ways to exploit the hidden gold in mountains of threat data.
  • Discover how XDR can accelerate threat detection and the subsequent mitigation of any malware and explots uncovered.
  • Get a clearer picture of building a business case for XDR and how to simplify its implementation

Featured Speakers

  • Jason Clark
    Jason Clark
    Independent Security Researcher

    Dr. Jason Clark is a subject matter expert in cyber security with nearly 20 years of real-world experience within the intelligence community, academia, and industry. He has extensive knowledge and experience on a variety of technology related topics. Currently, his main area of interest is researching and analyzing better methods to detect, deter, and mitigate insider threats. Dr. Clark holds a CISSP and is a member of IEEE and ACM. He has served on a number of program committees, delivered numerous virtual webinars, and has presented his published work at a variety of conferences around the world.

  • Peter Havens
    Peter Havens
    Director of Product Marketing
    Cortex at Palo Alto Networks

    Peter has been developing, architecting and leading product management and marketing for enterprise software and security services for 20 years and currently leading tech evangelism for Cortex cybersecurity products. Prior to Palo Alto Networks, Peter led product management for leading vendors in the Enterprise Mobile Management and Identity and Access Management spaces.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By