OCA Kestrel Project on the Agenda
Threat hunting has traditionally been a manual process, in which a security analyst sifts through various data information using their own knowledge and familiarity with the network to create hypotheses about potential threats. With technology advancements, threat hunting is now an iterative, continuous process that 1) searches for indicators of compromise in organizational systems, and 2) detects, tracks, and disrupts threats that evade existing controls. Join SC Media April 12-13 as we bring together a group of cybersecurity experts who will share presentations and discussions on topics such as:
- Establishing and maintaining a threat hunting capability
- Threat hunting methodologies, tools, and tips
- Leveraging and creating threat intelligence for your organization
Free to attend for OASIS members. View Recording here.