1. Online

Ever wondered what threat hunting is actually like and how it’s done? Assume at least some security controls implemented in the organization have failed at least once, allowing a threat actor or group into the environment. Come learn what hypothesis-based proactive threat hunting is all about and just how eye-opening it can be. This will be a fun hunt!