Threat Hunting has become an essential discipline for security operations teams, due to the persistence of attackers in evading perimeter controls and moving laterally within the network. So how can you integrate this capability efficiently into your SOC?
In this session, we’ll provide practical tips, techniques and a proven methodology that your analysts and threat hunters should use. We'll explore how to identify threats covering everything from developing hypotheses and locating infection evidence across environments to providing indicators for attack detection and mitigation strategies.