Top 5 Best Practices to Elevate Your Threat Hunting Program | SC Media
Vendor Webcast

Top 5 Best Practices to Elevate Your Threat Hunting Program

The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.

When

Thursday, June, 25th, 2020

2:00PM ET

Threat hunting is no longer a luxury, but a necessity. The sheer volume of threats and the ability of malware to lurk undetected warrants a program and skillset that proactively reduce time to detection and mitigate business risk. The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.

In this session, we’ll discuss:

  • How to assess your Threat Hunting maturity
  • How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
  • How to manage YARA rules and local Threat Intelligence to expose hidden threats
  • How to create an Early Warning System to identify threats before they have a chance to proliferate

By clicking the Create Account button below, you agree to SC Media Terms and Conditions and Privacy Policy.