Join Cisco's Advanced Threat Solutions Team for this hands-on Threat Hunting Workshop. In this workshop, you will uncover best practices for threat hunting, learn how to incorporate threat hunting into your daily workflow, network with your peers to share strategies and techniques and execute four real-world lap scenarios:
Hunt and Contain
A new threat is making headlines and your executives want complete answers fast. You need to know if it is inside your organization and how to contain it.
Catch the Phish
You have evidence that a remote user was phished. Follow the attack from entry to execution.
Event Overload
Hundres of events are clamoring for your attention, but you have a plan to prioritize and execute a response.
Screenshot Holds the Clue
There's not much to go on - just a single screenshot - but that's all you need to trace the attack back to the entry point.
Register now!