Many organizations want to threat hunt, but don't know where to begin, how to measure success, or how to scale an effective program. The bar to successful hunting can appear intimidatingly high, reachable by only the most sophisticated, well-staffed SOCs, but the reality is that one individual, with the right data and some directional guidance, can begin their hunting journey today and start making immediate security contributions to their organization.
Join seasoned security instructors on this webcast who will walk you through the threat hunting maturity model and help you prepare for each step of the journey with specific guidance, concrete examples, best practices, and sample threat hunts. Since virtually all attacks must cross the network and traffic provides an inalterable record of activity, this webcast will focus primarily on network-based threat hunting using the open-source Zeek network security monitor.
Register for this webcast to learn how to assemble the systems, data, people and processes you'll need to threat hunt and also see practical threat hunting exercises demoed by the instructors that you can instrument in your own environment to look for adversary behavior such as DNS-tunneling, C2 communications and more.