Interview - How to succeed at threat hunting & IR: Think differently about data

Interview - How to succeed at threat hunting & IR: Think differently about data

Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas, if you can trust the data. This session will explain how attackers can hide and misuse logs, agents, and standard security tools, and demonstrate effective approaches for countering their actions using network traffic analysis, passive monitoring, and real-time forensic data.


Loading feed

Speakers

Tony  Morbin Tony Morbin Editor-in-Chief SC Media UK
Jamie Moles Jamie Moles Senior Security Engineer Extrahop Bio
share