Transform threat hunting efforts from ad hoc to operational.
Many mature teams build targeted hunts into scheduled activities, but how do you move from an ad hoc effort to an operational function of your security program? And how do you justify the effort to advance from traditional monitoring to continuous threat hunting? The distinction goes far beyond semantics; it requires a change in core best practices.
Join Carbon Black and Red Canary to learn about strategies, team structure, and processes to help blue teams transform their threat hunting efforts from an ad-hoc tactic into a regular operational effort.
This on-demand webinar will help you:
- Understand the difference between traditional SOC monitoring and continuous, operationalized threat hunting
- Understand the processes for continuous tuning, development, and targeting of hunt efforts
- Develop measures based on open standards such as the MITRE ATT&CK framework to focus efforts and move to a continuous model