Загрузка страницы

How to Cyber Threat Hunt

Join the ACM Discord Community: https://discord.gg/dnmvXkz
0:00 - Forming Voltron
2:46 - Bad Guys, Bad Guys, Watcha Gonna Do When We Don't Catch You
10:19 - Can You Log Me Now?
13:14 - Catching Bad Guys Wearing Parachute Pants
21:26 - It's Threat Hunting Season
32:51 - Bad Guy Glasses
37:01 - Threat Scores and Seven IPs To Go
42:08 - Perfect Is As Perfect Does
44:38 - By The Power Of Discord
45:53 - Questions From the Floor?

Download Slides: https://www.activecountermeasures.com/presentations/
Presentations -- ACM_Webcasts -- How_to_cyber_threat_hunt

Have you noticed that two people can be talking about cyber threat hunting and actually be talking about two different things? It's kind of turned into this "thing" that everyone is talking about, but no one is really sure what it means. What is step #1? How do you know when a threat hunt is "done"? Is there a defined job description for a Cyber Threat Hunter? Clearly, it's time to create some guardrails around the topic.

Видео How to Cyber Threat Hunt канала Active Countermeasures
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
30 марта 2020 г. 20:58:53
00:52:15
Яндекс.Метрика