Главная
Study mode:
on
1
Intro
2
THANK YOU TO OUR COMMUNITY PARTNER
3
Threat Landscape
4
Finding Evil - In the Sea of Noise
5
The Detection Gap
6
Demystifying Threat Hunting
7
Threat Hunting Model - The Fabulous Five
8
Threat Hunting Model - Phase 1
9
Threat Hunting Model - Phase 4
10
Threat Hunting Model - Phase 5
11
Sample Use Case: Hunting for C2
12
Ten Commandments for Effective Threat Hunting 1. Gauge your cyber maturity level
Description:
Explore the often misunderstood concept of threat hunting in this 31-minute conference talk from RSA Conference. Delve into the world of unknown unknowns as Managing Principal Ashish Thapar from Verizon demystifies threat hunting and its importance as an effective cyber-defense strategy. Learn about the threat landscape, detection gaps, and a five-phase threat hunting model. Discover how to find evil in the sea of noise and examine a sample use case for hunting command and control (C2) activities. Gain insights into the ten commandments for effective threat hunting, including how to gauge your organization's cyber maturity level. Equip yourself with the knowledge to keep adversaries at bay and strengthen your cybersecurity posture through proactive threat hunting techniques.

Threat Hunting - Demystified

RSA Conference
Add to list