Building and Maturing Your Threat Hunting Program

Building an effective threat hunting program can be daunting. This paper addresses how to get started and covers building a team, what a typical hunt might look like and constructing a knowledge base for later use. It also covers how to create a test lab and use effective metrics.
June 24, 2019

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg
Sponsored By
Cisco_Systems.png