Thursday 18 July, 11am-12noon (BST)
Adversaries are getting faster, becoming more sophisticated, and using less malware. Even the most advanced tools cannot stop all breaches, which is why threat intelligence and threat hunting are important components of a cybersecurity programme.
During this talk, we covered how threat intelligence can be used before, during and after a breach, busted some intelligence myths, and discussed the role of threat hunting in securing the enterprise, all through the lens of the ever-evolving threat landscape.
Guest chaired by
Lesley Charteris (info), Independent
Presented by
Stuart Wiggins (info), Counter Adversary Practice Lead, CrowdStrike
Thursday 18 July, 11am-12noon (BST)
Adversaries are getting faster, becoming more sophisticated, and using less malware. Even the most advanced tools cannot stop all breaches, which is why threat intelligence and threat hunting are important components of a cybersecurity programme.
During this talk, we covered how threat intelligence can be used before, during and after a breach, busted some intelligence myths, and discussed the role of threat hunting in securing the enterprise, all through the lens of the ever-evolving threat landscape.
Guest chaired by
Lesley Charteris (info), Independent
Presented by
Stuart Wiggins (info), Counter Adversary Practice Lead, CrowdStrike