2018 ISSA Chapter Meeting Atlanta - Threat Hunting | VerSprite 2018 ISSA Chapter Meeting Atlanta - Threat Hunting | VerSprite

Threat Hunting: What's on Your Network?

Threats, Like Business, Constantly Evolve.

What is Threat Hunting?

Threat hunting is a collection of techniques that attempts to determine if malicious activities are taking place in an organization's computing environment. Threat hunting often takes place after a known or suspected compromise and is used to confirm the incident and determine its extent.

Many organizations use threat hunting to assess the capabilities of their security infrastructure as the techniques in threat hunting provide a 'check and balance' against traditional security technology.

Learn How to Identify Compromised Assets

This presentation provides an adaptive, heuristic approach that has been successfully used to identify compromised assets, rogue accounts, unauthorized software, organizational policy violations and poor security practices.

Download Presentation

We are an international squad of professionals working as one.

logos