Supercharge Your Security With Intelligence-Driven Behavioral Threat Hunting

Logo
Presented by

Mike Mitchell, VP of Threat Hunt Intelligence, Intel 471

About this talk

Security teams face the reality that sometimes adversaries will compromise an environment. A user may click on a link in a phishing email that downloads malware. A threat actor may exploit an unpatched vulnerability, or simply log in with compromised credentials. But once an adversary gains access, there is an opportunity for threat hunting to identify and remove a threat before they begin to move laterally. To act swiftly in a sea of log data, threat hunters need to know the tactics, techniques, and procedures (TTPs) of the adversary — an innovative and reliable way to identify intrusions and eliminate threats inside a network. This is intelligence-led behavioral threat hunting. Why use TTPs? Adversaries that have gained initial access to an organization, often use trusted applications allowing threats to conceal their activity, increasing the difficulty to detect ephemeral indicators of compromise (IOCs) and artifacts. It’s much harder for adversaries to adapt TTPs collected in cyber threat intelligence (CTI) programs. Join Intel 471 for our 30-minute webinar to discover: · Why CTI elevates hunts to new levels of accuracy and measurements of success · How to maximize the value of your security logging data with CTI-driven behavioral threat hunting · How to use CTI-powered behavioral threat hunt packages to identify stealthy, malicious activity · How behavioral threat hunting can identify precursors to ransomware attacks Don't miss out on this opportunity to learn how to strengthen your organization's security posture!
Related topics:

More from this channel

Upcoming talks (12)
On-demand talks (618)
Subscribers (44533)
Dedicated to serving the information security community, in person, in print and online.