Steps to building a successful threat hunting process

The Beginner's Guide to Threat Hunting

Cover

Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents.

This webcast outlines threat hunting strategies that security professionals can apply to their own environments. David Monahan, Managing Research Director at EMA and Taylor Wilkes-Pierce, Security Sales Engineer at DomainTools summarize key steps in a threat hunting process. These steps include maintaining:

  • A repeatable process
  • An activity log
  • Source data
  • Data integrity
  • And more
Vendor:
DomainTools
Premiered:
Dec 31, 2018
Format:
Multimedia
Type:
Webcast
Language:
English
Already a Bitpipe member? Login here

Download this Webcast!