Data Protection and Incident Response

Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.

November 10, 2016

 

Related Webinars

November 17, 2016 4:00pm EST

There’s no such thing as bad publicity? In the era of data breaches, that’s not really true. Time and again…

November 16, 2016 3:00pm EST

Employee accounts are being constantly targeted by black hat teams. Owning the keys to the kingdom leads to large payoffs….

November 16, 2016 9:30am EST

Build an Active Application Defense System Web applications accounted for an astounding 40% of last year’s security breaches. The challenges…