How to Set Up a Threat Hunting and Threat Intelligence Program

Logo
Presented by

Etay Maor, Sr. Director Security Strategy

About this talk

Threat hunters and red teams are two of the most important building blocks of an organization’s security program. In this session we will be joined by Ilya, former director of threat hunting at RBC and Nick, red team member at Gap share their approaches to setting up a threat intelligence and threat hunting program. The webinar covers multiple aspects of the security program including the utilization of the MITRE ATT&CK framework, how teams approach the Pyramid of Pain, maturity models and more.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (265)
Subscribers (16451)
Cato Networks provides organizations with a cloud-based and secure global SD-WAN that replaces rigid and expensive MPLS and network security point products -- to power the digital business. Cato connects all data centers, branches, mobile users, and cloud resources into a global, optimized cloud network that is tightly secured by a cloud-based network security stack and backed by expert managed security services. Cato cuts MPLS costs, improves performance between global locations and to cloud applications, eliminates branch appliances, provides secure Internet access everywhere, and seamlessly integrates mobile users and cloud datacenters into the WAN.