Threat Hunting Fundamentals: Why Network Data Should Be At Core of Your Process
Speakers: AJ Nurcombe (Corelight), Brandon Dunlop (ISC2)
Threat hunting is a challenge to get right, with many potential pitfalls. There are twenty different definitions for threat hunting and ten different ways to do it. Organisations vary from having zero presence in their threat hunting program to multiple full-time hunters, but unfortunately, they often miss many critical pieces. This webinar will cover the common oversights that organisations fall foul of as well as emphasising the importance of network evidence in your threat hunting
framework.
Join Corelight and (ISC)2 as we cover:
- What threat hunting is (and isn’t!)
- Essential tips and techniques to be successful
- How network data should form the core of your hunting framework