The Callback is Coming From Inside the House
This bone-chilling webinar will cover:
A spine-tingling hands-on-keyboard scenario of a motivated and capable insider threat working with the ghoulish adversary.
Use of realistic and terrifying exploits and offensive security tools to simulate adversary TTPs, and how organizations are able to hunt for them.
A practical threat hunting session demonstrating true behavioral hunting that walks participants through not only how the attack was carried out, but also how they can hunt for this insidious behavior in their own environments.
The vital role that visibility plays in threat hunting, and how combining network and endpoint telemetry can help shine a light on this evil activity.
Strategies that organizations and hunt teams can use today to spook the adversary and strengthen their own defenses.