THREAT HUNTING: FINDING HIDDEN & UNDETECTED NETWORK THREATS

Recorded Webinar

Sophisticated threat actors are the ones who can find the smallest vulnerabilities in your cyber defenses. Threat hunting has emerged as a powerful tool to find them. A recent study indicated 40% of security organizations have threat hunting programs in place today. What’s more, the other 60% plan to build one out over the next three years.

Threat Hunting- Finding Hidden & Undetected Network ThreatsThreat hunting addresses the nagging fear that threats are getting around your threat detection systems or have done so already and lurk unseen ready to strike at any time.

This recorded webinar, “Threat Hunting: Finding Hidden & Undetected Network Threats” features Tim Crothers, noted security leader and author, who discusses how you can mitigate your risk and improve your security posture with threat hunting.

During the webinar, Tim reviews:

  • Top reasons for threat hunting
  • How threat hunting works
  • Threat hunting outcomes
  • Identify good places to start threat hunting
  • How to execute a threat hunt and identify threats

Presenter

TC_imageTim Crothers is a seasoned security leader with over 20 years of experience building and running information security programs, large and complex incident response and breach investigations, and threat and vulnerability assessments. He has deep experience in cyber-threat intelligence, reverse engineering, computer forensics, intrusion detection, and threat hunting. Tim is the author/co-author of 15 books to date and regularly conducts training and speaks at information security conferences around the world.

Please complete the form to access the Webinar

Bricata Included as a Representative Vendor in a new Market Guide for Intrusion Detection and Prevention Systems by Gartner, Inc.
“IDS is still a widely deployed use case. Despite claims of IDS being dead, it is alive and well, and in use by a large percentage of Gartner clients,” wrote Gartner analysts.
+ +