Threat Hunting Fundamentals: Why Network Data Should Be At Core Of Your Process

Logo
Presented by

Ashley 'AJ' Nurcombe, Sr Cyber Security Engineer, Brandon Dunlap, Moderator

About this talk

Threat hunting is a challenge to get right, with many potential pitfalls. There are twenty different definitions for threat hunting and ten different ways to do it. Organisations vary from having zero presence in their threat hunting program to multiple full-time hunters, but unfortunately, they often miss many critical pieces. This webinar will cover the common oversights that organisations fall foul of as well as emphasising the importance of network evidence in your threat hunting framework. On 6 April 2023 join Corelight and (ISC)2 at 1:00 p.m. BST as we cover: • What threat hunting is (and isn’t!) • Essential tips and techniques to be successful • How network data should form the core of your hunting framework
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (400)
Subscribers (95003)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs