Advanced Digital Forensics, Incident Response, and Threat Hunting
July 31, 2017 - August 5, 2017
Event Navigation
The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done worse damage to the organization. For the incident responder, this process is known as “threat hunting”. Threat hunting uses known adversary behaviors to proactively examine the network and endpoints in order to identify new data breaches.