Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017
The Security Operations Center (SOC) is intended to be the nexus of protection for the organization. There are many things it must do. This talk will depict a model for security operations and the data flow of threat hunting within the SOC. This includes: inputs, outputs, staff members and technology necessary to accomplish the often misconstrued task of threat hunting.
Chris Crowley (@CCrowMontance), Principal Instructor, SANS Institute
Видео Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017 канала SANS Digital Forensics and Incident Response
Chris Crowley (@CCrowMontance), Principal Instructor, SANS Institute
Видео Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017 канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
10 сентября 2017 г. 3:00:03
00:27:39
Другие видео канала
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020SOC 101: Real-time Incident Response WalkthroughHuntworld - SANS Threat Hunting & Incident Response Summit 2017Everything Security Operations Analyst Entry Level - Is it the Cyber Security Job for you?Discover the secrets of a SOC and how to build a Threat Hunting teamReal-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017Cybersecurity Incident Response Tabletop Exercise Scenario | Cybersecurity Leadership | Day 3 – Ep3SANS Webcast: Effective (Threat) Hunting TechniquesHunting on Amazon Web Services (AWS) - SANS Threat Hunting Summit 2017Cyber Threat Hunting: Identify and Hunt Down IntrudersThe Basics of the Threat Hunting Process with Security Weekly and LogRhythmFind_Evil - Threat Hunting | SANS@MIC TalkUnderstanding Indicators of Compromise for Incident ResponseWhat Does my SOC Do?: A Framework for Defining an InfoSec Ops Strategy - SANS DFIR Summit 201615 Classifying File less Malware AttacksThreat Intelligence Made Easy - SOC ExpertsCSS2018LAS8: Incident Handling Process - SANS