Cyber Threat Hunting
Cyber threat hunting is a proactive cyber defence activity. It is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” Source Wikipedia.
Join us on the 16th August at 4pm BST Part 1
I’m delighted to invite you to our next webinar on Wednesday 16th August at 4pm (UK time) for twenty minutes with our Threat Intelligence Analyst, Daniel Collyer and your host Jon Moss.
This is the first part of a series of two webinars on this subject.
In this first event, you will learn:
-
- What is Threat Hunting and the different roles
-
- Why is it so important?
-
- The Threat Hunting Maturity Model
-
- The process
-
- Hypothesis Building
Sign up to the webinar to receive a recording via email if you cannot attend on the day.
14TH AUGUST WEBINAR
CLICK HERE TO JOIN USJoin us on the 30th August at 4pm BST for Part 2: Techniques and Tools for Cyber Threat Hunting
In this second event we will cover:
-
- Common threat hunting techniques, such as Signature-based hunting, Anomaly detection and Behavioural analysis
-
- An introduction to our platform
-
- Key Steps of Cyber Threat Hunting with SOS Intel
-
- Real-World Use Cases
Hosted by Jon Moss with Amir Hadzipasic, CEO and Founder with Daniel Collyer, Threat Intelligence Anlayst, we will provide a fast-paced and interesting 20 minute session.
30TH AUGUST WEBINAR
CLICK HERE TO JOIN USPhoto by Markus Spiske on Unsplash