Ever wondered what threat hunting is actually like and how it’s done? Assume at least some security controls implemented in the organization have failed at least once, allowing a threat actor or group into the environment. Come learn what hypothesis-based proactive threat hunting is all about and just how eye-opening it can be. This will be a fun hunt!
This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.
Basic functional knowledge of how exploits work, fundamental understanding of network protocols, how memory works, and high-level understanding of forensics, including network and memory. Understanding does not have to be from hands-on experience as that is exactly what we will be providing.
This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
Analytics Intelligence & Response Hackers & Threats
cyber warfare & cyber weapons exploit of vulnerability forensics & e-discovery incident response threat intelligence
Share With Your Community