Becoming a Threat Hunter in Your Enterprise

Presented by

John H Sawyer, Senior Security Analyst at InGuardians and Chris Pace, Technology Advocate at Recorded Future

About this talk

You’re tired of waiting. Tired of waiting for your technology to alert you that there’s already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter. And why not? Organizations who use threat hunting find it reduces their attack surface and enhances their incident response speed and accuracy. Yet few have formal programs in place with clear methodologies and repeatable processes. Attend this webinar and you’ll learn: • How threat hunting works • What a formal threat hunting program looks like • What skills any threat hunter should have • The threat hunter’s essential tricks and techniques of the trade

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (59)
Subscribers (16848)
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human analysis or instant integration with existing security technology.