Thank you for filling out a form!

Now you can download your resource file.


Threat Hunting: What’s on Your Network?

VerSprite's Upcoming Presentation Threat Hunting: What's on Your Network?

Threat hunting is a collection of techniques that attempts to determine if malicious activities are taking place in an organization's computing environment. Threat hunting often takes place after a known or suspected compromise and is used to confirm the incident and determine its extent. Many organizations use threat hunting to assess the capabilities of their security infrastructure as the techniques in threat hunting provide a 'check and balance' against traditional security technology. Recently many organizations have expanded their use of threat hunting to supplement their merger and acquisition efforts. Ray Strubinger, VerSprite’s Managing Consultant for Digital Forensics & Incident Response, has lead threat hunting efforts many scenarios and will share his experiences and the lessons learned from assessing diverse environments. This presentation will provide an adaptive, heuristic approach that has been successfully used to identify compromised assets, rogue accounts, unauthorized software, organizational policy violations and poor security practices. Learn how VerSprite can help your organization combine business knowledge with technical skill to create solutions that achieve balance among risk, security and the needs of the business.

Sign Up for the ISSA Chapter Meeting

Event Details:


Metro Atlanta ISSA - September Chapter Meeting 1 Concourse Pkwy #500 Atlanta, GA 30328


Thursday, September 27, 2018 from 6:30 PM to 8:30 PM (EDT) Sign Up →
Subscribe for Our Updates

Subscribe for Our Updates

Please enter your email address and receive the latest updates.