Know your adversary to stop breaches: The role of intelligence and threat hunting | SASIG
Forgotten your password?

Thursday 18 July, 11am-12noon (BST)

Adversaries are getting faster, becoming more sophisticated, and using less malware. Even the most advanced tools cannot stop all breaches, which is why threat intelligence and threat hunting are important components of a cybersecurity programme.

During this talk, we covered how threat intelligence can be used before, during and after a breach, busted some intelligence myths, and discussed the role of threat hunting in securing the enterprise, all through the lens of the ever-evolving threat landscape.

 

Guest chaired by

Lesley Charteris (info), Independent

 

Presented by

Stuart Wiggins (info), Counter Adversary Practice Lead, CrowdStrike

Log in to watch the webinar on demand


Log in here

Thursday 18 July, 11am-12noon (BST)

Adversaries are getting faster, becoming more sophisticated, and using less malware. Even the most advanced tools cannot stop all breaches, which is why threat intelligence and threat hunting are important components of a cybersecurity programme.

During this talk, we covered how threat intelligence can be used before, during and after a breach, busted some intelligence myths, and discussed the role of threat hunting in securing the enterprise, all through the lens of the ever-evolving threat landscape.

 

Guest chaired by

Lesley Charteris (info), Independent

 

Presented by

Stuart Wiggins (info), Counter Adversary Practice Lead, CrowdStrike

This website uses cookies, by continuing to use the site you agree to using cookies. Continue