• Take a Tour
  • Get a Live Demo
  • Take a Tour
  • Get a Live Demo
  • Platform
    • Overview
    • How it Works
    • Who Uses Bricata
    • Use Cases
  • Company
    • About
    • Team
    • Partners
    • Newsroom
    • Careers
  • Why Bricata
    • Get the Facts
  • Resources
    • Blog
    • Explore All
  • Contact
    • Get Info

Webinar

THREAT HUNTING: FINDING HIDDEN & UNDETECTED NETWORK THREATS

Sophisticated threat actors are the ones who can find the smallest vulnerabilities in your cyber defenses. Threat hunting has emerged as a powerful tool to find them. A recent study indicated 40% of security organizations have threat hunting programs in place today. What’s more, the other 60% plan to build one out over the next three years.

Threat Hunting- Finding Hidden & Undetected Network ThreatsThreat hunting addresses the nagging fear that threats are getting around your threat detection systems or have done so already and lurk unseen ready to strike at any time.

This recorded webinar, “Threat Hunting: Finding Hidden & Undetected Network Threats” features Tim Crothers, noted security leader and author, who discusses how you can mitigate your risk and improve your security posture with threat hunting.

During the webinar, Tim reviews:

  • Top reasons for threat hunting
  • How threat hunting works
  • Threat hunting outcomes
  • Identify good places to start threat hunting
  • How to execute a threat hunt and identify threats

Presenter

TC_imageTim Crothers is a seasoned security leader with over 20 years of experience building and running information security programs, large and complex incident response and breach investigations, and threat and vulnerability assessments. He has deep experience in cyber-threat intelligence, reverse engineering, computer forensics, intrusion detection, and threat hunting. Tim is the author/co-author of 15 books to date and regularly conducts training and speaks at information security conferences around the world.

More Resources
Take a Tour
Get a Live Demo

Bricata is the industry’s leading network detection and response platform, fusing signature inspection, stateful anomaly detection, and machine learning-powered malware conviction to empower security teams to detect, respond, hunt and defend against threats.

  • Platform
    • Overview
    • How it Works
    • Who Uses Bricata
    • Use Cases
  • Company
    • About
    • Team
    • Partners
    • Newsroom
    • Careers
  • Why Bricata
    • Get the Facts
  • Resources
    • Blog
    • Explore All
  • Contact
    • Get Info

©2021 Bricata All Rights Reserved

Site Map | Privacy | End User License Agreement

Scroll to top