The Threat Hunter's

Learn the approach and analytical frameworks that top threat hunters use to find and neutralize hidden threats.
Register Now

Jon Oltsik, Senior Cybersecurity Analyst ESG Logo
Thomas Hazel, Founder & CEO cs-logo_black-name_only
Date: Wednesday, March 24 at 11a ET / 8a PT

  • How to adopt a Hunter's mindset, and the analytical framework that the best Threat Hunters use.
  • How understanding the 6 common stages of an advanced persistent attack is fundamental to tracking down your adversaries.
  • A breakdown of the recent SolarWinds compromise, focusing on the evidence that Threat Hunters can look for to hunt down and neutralize similar attacks.
  • An interactive workshop demonstrating how Threat Hunters use log analytics to conduct their hunts.

Where does threat hunting begin?

Threat Hunting begins where most cybersecurity defense tools and techniques end: once the perimeter has been compromised.

Advanced persistent threats (APTs), and the malicious actors that run them, take a “slow and low” approach, seeking to linger beneath the radar within your network, collecting intelligence without making waves, and covering their tracks along the way.

But even the best hackers leave clues.

Join this webinar to learn more!

Register Now
Where Threat Hunting Begins