ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data

Logo
Presented by

Matt Cauthorn, VP of Cyber Security Engineering, ExtraHop; Brandon Dunlap, Moderato

About this talk

Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas. This webcast will examine threat hunting and incident response and how network traffic analysis can make Tier 1 and Tier 3 analysts faster and more effective at validating, investigating, and responding to threats and security incidents
Related topics:

More from this channel

Upcoming talks (12)
On-demand talks (444)
Subscribers (135646)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.