Security Forensics & Threat Hunting - Uncovering Actionable Events
1:03:02
Security Weekly experts provide advice on the role of forensics and threat hunting in security strategies.
Related Videos
In Enterprise Webinars
-
Play video 5 Keys to Improving Network Performance with Flow & Wire Data
5 Keys to Improving Network Performance with Flow & Wire Data
Understand values and shortcomings of different data sources whether packet-based, flow, or device details, and when to most effectively utilize each source in managing and investigating network performance and security issues.
1:00:08
-
Play video Community Discussion: Ensuring Business Continuity in a Remote Working Environment Through Network Performance Management
Community Discussion: Ensuring Business Continuity in a Remote Working Environment Through Network Performance Management
A discussion focused on managing connectivity in remote working environments based on customer provided priorities.
53:41
-
Play video 4 Gaps to Fix in Your Security Detection and Response
4 Gaps to Fix in Your Security Detection and Response
Former US Marine security threat hunter Brad Palm, security investigator Tim O’Neill, and certified ethical hacker Matt Allen, identify the four biggest gaps and discuss strategies that NetOps and SecOps need to implement.
58:17
-
Play video SANS Webinar: Converged Threat & Performance Management - Listen to Your Network
SANS Webinar: Converged Threat & Performance Management - Listen to Your Network
This session will discuss potential data sources that you've already invested in and deployed that contain untapped veins of information that will help you find and resolve threats and performance problems.
58:48
-
Play video 5 Keys to Improving Network Performance with Flow & Wire Data
5 Keys to Improving Network Performance with Flow & Wire Data
Understand values and shortcomings of different data sources whether packet-based, flow, or device details, and when to most effectively utilize each source in managing and investigating network performance and security issues.
1:00:08
-
Play video InfoWeek Webinar - Threat & Performance Management: 2 Key Data Sources
InfoWeek Webinar - Threat & Performance Management: 2 Key Data Sources
Learn about two well known, but often under-utilized data sources that can help you succeed in your hunt for answers. It includes a live demonstration of how these data sources can help SecOps and NetOps teams to collaborate effectively.
57:16