Threat Hunting 101
This on-demand webinar walks through a layered approach to threat hunting and provides the insights you need to start building threat hunting into your security operations.
Attendees will learn:
- Proven techniques to make threat hunting more efficient
- How to use threat research to assess the effectiveness of detections
- A timeline with actionable steps to incorporate threat hunting into your security operations
Related Resources
CISO’s Debate: Is attacker attribution important?
CISO’s Debate: Is attacker attribution important?
Privilege escalation revisited: webinar highlights
Privilege escalation revisited: webinar highlights
Detection Déjà Vu: a tale of two incident response engagements
Detection Déjà Vu: a tale of two incident response engagements
Black Hat: Detecting the unknown and disclosing a new attack technique
Black Hat: Detecting the unknown and disclosing a new attack technique