How to Hunt for Security Threats

How to Hunt for Security Threats
Start: August 14, 2018
iCal Import

Threat Hunting (TH) is the process to search and identify the security threats across the internet and networks that may be escaped by the automated systems. Threat Hunting used the manual or machine-assisted methodologies to hunt and identify the security incidents through the networks. Effective review of the security infrastructure can contribute to efficient threat hunting to search for any operational deficiencies and malicious activities.

This interactive session explains core fundamentals of Threat Hunting (TH) and help you gain in-depth insights of how threat hunting capabilities are emerging as an integral part in cyber security.


» Introduction to Threat Hunting
» How to incorporate TH into the organizational SOC processes
» How to develop TH capabilities
» Getting ideas to hunt for cyber threats
» How to measure TH successes and effects
» Q&A session with the speaker


CATEGORY: Events, Webinars

Popular posts

Related posts