mlns='http://www.w3.org/1999/xhtml'>
Learn What Clues A Threat Hunter Looks For | Join Us July 14
John, for years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization. Attend this webinar and you'll: Learn how to make time for hunting threats when you're already too busy swatting at security alerts Learn what clues a threat hunter looks for to track and locate active attackers Discover ways to streamline secops and empower human security analysts to take on attackers when they least expect it |
|
|
|
John Sawyer Director Of Services, Red Team IOActive, Inc |
Tim Wilson Editor In Chief & Co-Founder Dark Reading |
|
|
|
|