Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Network Visibility in Cybersecurity Strategy

N-able
04/06/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Network visibility requires looking beyond endpoints to include network infrastructure, cloud services, SaaS applications, and identity systems—encrypted traffic and lateral movement create blind spots that endpoint-only strategies cannot address.
  • Major breaches like Salt Typhoon (18-month undetected compromise of US telecom providers) and Colonial Pipeline demonstrate that even large enterprises fail to detect attackers when network visibility and segmentation are inadequate.
  • Implementing comprehensive visibility means deploying and actively monitoring IDS/IPS, collecting logs from cloud environments and SaaS apps, implementing network segmentation, and using anomaly detection to identify unusual traffic patterns.
  • Managed detection and response (MDR) services have evolved from advanced capabilities to baseline requirements, providing 24/7 monitoring, automated response, and cross-integration detections that correlate security events across multiple sources.
  • N-able's AdLumen MDR platform offers multi-tenant management with fully searchable security data across diverse integrations, supporting MSPs from self-service XDR to fully managed services depending on their security operations maturity.

The Network Visibility Challenge

This webinar addresses a critical gap in cybersecurity strategy: the lack of comprehensive network visibility beyond endpoint security. Jim Waggoner, VP of Product Management at N-able, and Kevin O'Connor, Head of Threat Research with 15 years of cybersecurity experience including work at the NSA, explain how organizations create security blind spots by focusing exclusively on endpoint protection. They demonstrate that true network visibility requires a holistic approach encompassing network infrastructure (routers, switches, firewalls, IDS/IPS), traffic and data visibility (NetFlow, DNS, TLS logs), cloud and SaaS applications, identity and authentication systems, and advanced threat detection platforms. The session emphasizes that modern networks are complex ecosystems where encrypted traffic, lateral movement, and multi-cloud environments create challenges that endpoint-only strategies cannot address.

Real-World Breach Examples

The presenters illustrate the consequences of poor network visibility through two major incidents. The Salt Typhoon espionage campaign against US telecommunications providers (AT&T, Verizon, T-Mobile) went undetected for 18 months, with Chinese state-sponsored hackers accessing court-authorized wiretapping systems because there was no anomaly detection for lateral movement or data exfiltration. The Colonial Pipeline ransomware attack forced a complete shutdown because the company couldn't determine whether the operational technology network was compromised, as there was no segmentation or visibility between IT and OT environments. These cases demonstrate that even large enterprises with significant resources fail to detect breaches when network visibility is inadequate, and that the average dwell time for attackers can extend to months or years before discovery.

Implementing Comprehensive Visibility

The webinar provides practical guidance for improving network visibility through specific technologies and best practices. Key recommendations include deploying and actively monitoring IDS/IPS systems (which many organizations have but don't properly utilize), implementing network segmentation to separate administrative, user, and operational traffic, integrating cloud environment monitoring (AWS, Azure, O365) as a critical third pillar alongside network and endpoint security, and collecting logs from SaaS applications and identity providers. The presenters emphasize that threat intelligence, while valuable for detecting known bad actors, must be combined with anomaly detection to identify unusual traffic patterns, data volumes, or destinations. They introduce managed detection and response (MDR) services as a solution for organizations lacking the resources to aggregate and analyze security data from multiple sources, positioning 24/7 monitoring and automated response as baseline requirements rather than advanced capabilities.

The MDR Solution Framework

N-able's approach through its AdLumen MDR platform addresses the complexity of multi-source security data aggregation. The platform supports integrations across diverse vendors and technologies (AWS, Azure, CrowdStrike, Cisco, firewalls, O365, Jira, and others) to provide cross-integration detections that correlate events across different security layers. Unlike black-box solutions, AdLumen offers multi-tenant management with fully searchable data, allowing MSPs to manage multiple customers while maintaining visibility into raw security events. The service model spans a spectrum from self-service XDR platform access for mature security operations teams to fully managed 24/7 MDR services with automated threat remediation for organizations early in their security journey. The presenters position this as part of a broader shift where centralized security log aggregation and analysis—once considered advanced—is now a baseline expectation for any organization handling customer data or facing regulatory compliance requirements.

Chapters

0:00 - Introduction and Speaker Backgrounds
3:25 - Defining Network Visibility
5:22 - Components of Network Visibility
10:07 - Poll: IDS/IPS Implementation
13:01 - Encrypted Traffic Challenges
29:05 - Poll: Security Technologies Implemented
31:00 - Real-World Breach Examples
42:46 - Best Practices for Network Security
45:04 - Poll: Security Best Practices
48:02 - MDR Platform Overview
52:11 - Poll: Interest in MDR Services
53:45 - Closing and Next Webinar

Key Quotes

1:11 "I've got a really strong background in cybersecurity, been working about 15 years, specifically in cybersecurity. A lot of it was spent at the National Security Agency doing both defensive and offensive, where I got to run into a lot of different, you know, advanced persistent threat groups, you know, crimeware groups, and get to see them operating throughout environments and see exactly what their tactics and techniques are."
4:03 "Network visibility is it's your ability to see, understand and sort of secure all the activity across your network, right across your digital environment. And when I say network, I'm not just talking about those, you know, individual networking components that, you know, send your traffic from one place to another. And we're not just talking about the specific endpoints like the specific computers, we're talking about a holistic approach that looks not just at necessarily, like the hardware that you have deployed in your environment, but also things like third party applications that you might use, you know, SaaS applications, cloud environments, really that holistic approach to your entire, you know, digital architecture and digital environment."
33:00 "Chinese state-sponsored hackers, in this case it was Salt Typhoon, which again is associated with the Chinese MSS, Ministry of State Security, focusing on cyber espionage and counterintelligence, they essentially went out and were able to hack all of these different telecommunications providers. They used a bunch of different methods, mostly exploiting vulnerabilities that had patches issued, but hadn't been updated in the networks yet. And once they were in those networks, the hackers were able to move laterally and they were able to remain undetected for something like 18 months."
34:11 "When they actually infiltrated these systems, there wasn't the visibility for that lateral movement for them to actually see the attackers moving into things like these providers have court-authorized wiretapping systems that these Chinese intelligence agencies were essentially accessing. So imagine the FBI has a wiretap on whoever, the Chinese government was essentially hacking Verizon to then get access to that wiretap data as well."
35:46 "The attackers were able to get into the network, like the traditional IT network. And the problem was, they didn't actually initially, or I don't even know if they ever figured out if they infected the operations network, which actually ran the systems, but because there was no segmentation between the IT and the operational networks, they actually had to shut everything down because they didn't know what was compromised, right? ..."
13:17 "Most of your web traffic at this point, hopefully has moved over to HTTPS services, and even things that aren't your typical browser web traffic have hopefully also migrated over to those TLS protected services. So think about things like traffic like automated updates and stuff, which might in the past have been passed over, unsecure, unencrypted, now they're encrypted. And the problem with that is you can't see into it."
11:00 "IDSs and IPSs are kind of seen as like basic and taken for granted in security. They're technologies that are over 20 years old, you know, that are implemented in by tons of vendors. Everybody from Palo Alto to IBM with QRadar has things like IDSs and IPSs. But what we see is that a lot of organizations haven't implemented these, or if they have, they're not actually looking at the logs from them."
30:01 "One of the biggest risks of having poor network visibility is not knowing when you're compromised. And that's what we're gonna see here in these two cases is there was compromise, but they didn't know. They didn't have the insight or the ability to say, hey, something is up here, something's wrong. There's terabytes of traffic or gigabytes of traffic destined out of our network to a server in Belarus, right? ..."
48:18 "I really want to stress that whether it's at Lumen or it's another platform, you do need that central place where you're aggregating those security logs so that you can draw that bigger picture, you know, across your environment. I mean, just imagine you're a detective and you're trying to like solve a case and you only have, you know, one very specific piece of evidence, right. You're not going to be able to see the bigger picture."
52:57 "MDRs are really becoming a basic component of security these days. Like back, I remember 10 years ago, having something like Splunk implemented in your network that was collecting data from all your different components was seen as being like, yeah, I'm advanced. I'm on top of it. We have full visibility. But these days, that's just the basics. That's the basics, what's expected of people."

Categories:
  • » Cybersecurity » Network Security
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Network Security
  • Security Operations
  • Threat Intelligence
  • Cloud Security
  • Webinar
  • Best Practices
  • Technical Deep Dive
  • Network Visibility
  • Managed Detection and Response
  • Intrusion Detection Systems
  • Network Segmentation
  • Encrypted Traffic Monitoring
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Network Visibility in Cybersecurity Strategy

              Upcoming Webinar Calendar

              • 04/08/2026
                11:00 AM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202611:00 AM ET
                • Apr
                  15

                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                  04/15/202601:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    • Apr
                      30

                      The New Economics of VMware Exit

                      04/30/202601:00 PM ET
                      More events
                      Truth in IT
                      • Sponsor
                      • About Us
                      • Terms of Service
                      • Privacy Policy
                      • Contact Us
                      • Preference Management
                      Desktop version
                      Standard version