Login Header
Log In Now!
April 12, 2022
10:45 am – 4:00 pm EDT

Threat hunting has traditionally been a manual process, in which a security analyst sifts through various data information using their own knowledge and familiarity with the network to create hypotheses about potential threats.  With technology advancements, threat hunting is now an iterative, continuous process that 1) searches for indicators of compromise in organizational systems and 2) detects, tracks, and disrupts threats that evade existing controls.   Key discussion and presentation topics will include: 

• Establishing and Maintaining a Threat Hunting Capability

• Threat Hunting Methodologies, Tools, and Tips

• Leveraging and Creating Threat Intelligence for Your Organization

Register Now!


Email Address

If you receive an "Already Logged In" message, wait 1 minute before re-entering.

Terms Of Use | Privacy Policy | Computer Tips | Login Help

By logging in, you agree to the Terms of Use and Privacy Policy.