This resource is no longer available

Cover Image

Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents.

This webcast outlines threat hunting strategies that security professionals can apply to their own environments. David Monahan, Managing Research Director at EMA and Taylor Wilkes-Pierce, Security Sales Engineer at DomainTools summarize key steps in a threat hunting process. These steps include maintaining:

  • A repeatable process
  • An activity log
  • Source data
  • Data integrity
  • And more
Vendor:
DomainTools
Premiered:
Dec 31, 2018
Format:
Multimedia
Type:
Webcast

This resource is no longer available.