Intelligence-driven threat hunting, or don't let the hunter to become the prey
Many businesses blindly implement Threat Hunting in their infrastructures while remaining unaware of the solution that lies at the core of TH and other security processes.
Threat Hunting (TH) has captured the minds of security analysts worldwide. Companies often use it without truly understanding what they are looking for and without knowing how to interpret the TH results. Many businesses blindly implement TH in their infrastructures while remaining unaware of the solution that lies at the core of TH and other security processes.
This solution has already been implemented in countless organizations, but it is mostly used on its own. It is called Cyber Threat Intelligence & Attribution (CTI).
What you'll learn in the webinar:
-How CTI can be used to develop intelligence-driven hypotheses
-How CTI helps make the threat hunting process more effective
-Why this method is faster compared to other methods of hypothesis generation
Speakers:
Oleg Skulkin
Lead Digital Forensics Specialist at Group-IB
Roman Rezvukhin
Acting Deputy Head of Digital Forensics and Malware Analysis Lab
Видео Intelligence-driven threat hunting, or don't let the hunter to become the prey автора Эзотерическая волшебная сущность
Видео Intelligence-driven threat hunting, or don't let the hunter to become the prey автора Эзотерическая волшебная сущность
Информация
15 ноября 2023 г. 11:19:16
00:47:28
Похожие видео