How to Cyber Threat Hunt
Join the ACM Discord Community: https://discord.gg/dnmvXkz
0:00 - Forming Voltron
2:46 - Bad Guys, Bad Guys, Watcha Gonna Do When We Don't Catch You
10:19 - Can You Log Me Now?
13:14 - Catching Bad Guys Wearing Parachute Pants
21:26 - It's Threat Hunting Season
32:51 - Bad Guy Glasses
37:01 - Threat Scores and Seven IPs To Go
42:08 - Perfect Is As Perfect Does
44:38 - By The Power Of Discord
45:53 - Questions From the Floor?
Download Slides: https://www.activecountermeasures.com/presentations/
Presentations -- ACM_Webcasts -- How_to_cyber_threat_hunt
Have you noticed that two people can be talking about cyber threat hunting and actually be talking about two different things? It's kind of turned into this "thing" that everyone is talking about, but no one is really sure what it means. What is step #1? How do you know when a threat hunt is "done"? Is there a defined job description for a Cyber Threat Hunter? Clearly, it's time to create some guardrails around the topic.
Видео How to Cyber Threat Hunt канала Active Countermeasures
0:00 - Forming Voltron
2:46 - Bad Guys, Bad Guys, Watcha Gonna Do When We Don't Catch You
10:19 - Can You Log Me Now?
13:14 - Catching Bad Guys Wearing Parachute Pants
21:26 - It's Threat Hunting Season
32:51 - Bad Guy Glasses
37:01 - Threat Scores and Seven IPs To Go
42:08 - Perfect Is As Perfect Does
44:38 - By The Power Of Discord
45:53 - Questions From the Floor?
Download Slides: https://www.activecountermeasures.com/presentations/
Presentations -- ACM_Webcasts -- How_to_cyber_threat_hunt
Have you noticed that two people can be talking about cyber threat hunting and actually be talking about two different things? It's kind of turned into this "thing" that everyone is talking about, but no one is really sure what it means. What is step #1? How do you know when a threat hunt is "done"? Is there a defined job description for a Cyber Threat Hunter? Clearly, it's time to create some guardrails around the topic.
Видео How to Cyber Threat Hunt канала Active Countermeasures
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
ACM Webcast: Network Threat Hunting RunbookSANS Webcast: Effective (Threat) Hunting TechniquesThreat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020SIEM vs SOC in Cyber Security - Complete Guide - Learn the differences and benefitsSOC 101: Real-time Incident Response WalkthroughFind_Evil - Threat Hunting | SANS@MIC TalkThreat Detection and Hunting for Common MITRE ATT&CK TechniquesA Field Guide to Insider Threat Helps Manage the RiskWhat is Cyber Threat Hunting and How to Get StartedYou MUST understand Cyber Threat Intelligence to Blue Team w/Samuel KimmonsHow To Build Threat Hunting Into Your Security Operations | InfoSec MattersThreat Hunting Beacon AnalysisThreat Hunting via Sysmon - SANS Blue Team SummitTales from the Network Threat Hunting Trenches & AI Hunter DemoThreat Hunting in Active Directory EnvironmentReal-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017A Technical Introduction to Zeek/Bro, Network Security's Best Kept SecretDeTT&CT: Mapping Your Blue Team To MITRE ATT&CK - Ruben Bouman and Marcus BakkerIntro To Threat HuntingThreat Hunting Tutorial for Beginners | Techniques | Security Operations | VAPT SOC SIEM