InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threat Hunting Log4j Exploits with Falcon OverWatch

Presented by

Michael Wylie (Snr Manager, Threat Response, Falcon OverWatch Elite), Jessica Lee (Threat Response Analyst, OverWatch Elite)

About this talk

Since the initial disclosure of Log4j, the OverWatch team, CrowdStrike’s elite team of threat hunters, has maintained around-the-clock vigilance, tracking the evolution of the Log4j threat, and developing techniques to uncover stealthy attempts to exploit it. Join our OverWatch experts for a summary of the team’s threat hunting insights. You’ll get a real-world view from the experts on the front lines and gain insights you can use to kickstart your own Log4j threat hunting efforts. Join this CrowdCast to hear more about: • A look at the Log4j vulnerability through the eyes of elite threat hunters • Case studies providing insights into how adversaries are carrying out their campaigns in the wild • Ideas for suggested threat hunting techniques you can put into action in your own environment
CrowdStrike

CrowdStrike

36133 subscribers243 talks
Insightful, education and actionable content for security teams
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.
Related topics