Threat Hunting in the Modern SOC with Splunk
Watch this Corelight and Splunk webcast on the subject of threat hunting in the modern SOC. We'll cover the following:
--Threat hunting vs. incident response
--What does the next generation SOC stack look like (Splunk SIEM, Corelight NDR, Splunk Phantom SOAR)
--Why Corelight NDR powered by Zeek is the industry gold standard for threat detection, incident response, and threat hunting
--How the Corelight and Splunk joint solution gives organizations rapid, precise answers to critical security questions
--Network security use cases
--Demo - threat hunting using Corelight and Splunk
Видео Threat Hunting in the Modern SOC with Splunk канала Corelight, Inc
--Threat hunting vs. incident response
--What does the next generation SOC stack look like (Splunk SIEM, Corelight NDR, Splunk Phantom SOAR)
--Why Corelight NDR powered by Zeek is the industry gold standard for threat detection, incident response, and threat hunting
--How the Corelight and Splunk joint solution gives organizations rapid, precise answers to critical security questions
--Network security use cases
--Demo - threat hunting using Corelight and Splunk
Видео Threat Hunting in the Modern SOC with Splunk канала Corelight, Inc
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Discover the secrets of a SOC and how to build a Threat Hunting teamSANS Webcast: Effective (Threat) Hunting TechniquesTechnical Workshop: Roberto Arico & Ahmed El-Kosairy - CybereasonWebinar: Splunk Enterprise Security (Splunk ES)How to Prevent Lateral Movement and Data ExploitationHow to Start a SpeechFind_Evil - Threat Hunting | SANS@MIC TalkMy “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019How Splunk Works | Log Monitoring Splunk | Splunk Architecture | IntellipaatOpen Season: Building a Threat Hunting Program with Open Source ToolsEval Command In Splunk | What Is Eval In Splunk & Eval Command Splunk Examples | Thetips4youAWS re:Inforce 2019: The Fundamentals of AWS Cloud Security (FND209-R)How to Improve Threat Detection and Hunting in the AWS Cloud Using the MITRE ATT&CK MatrixMS Defender ATP Overview and Full Attack SimulationFRAUD INVESTIGATION STRATEGY with Mr. JOHN D. GILLSplunk Commands | Splunk stats | Splunk eventstatsSplunk for Security Investigation: Endpoint Advanced Malware AnalysisSplunk 101: Basic SearchWhat Is A Security Operations Center? (SOC Expert Explains) | PurpleSecThe Threat Intel Victory Garden: Threat Intelligence Using Open Source Tools - CTI SUMMIT 2017