mlns='http://www.w3.org/1999/xhtml'>

Learn How To Build A Threat Hunting Program
 
Dark Reading Webinar
 
John, for years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need?

Attend this webinar and you'll:
  • Learn how to make time for hunting threats when you're already too busy swatting at security alerts
  • Learn what clues a threat hunter looks for to track and locate active attackers 
  • Discover ways to streamline secops and empower human security analysts to take on attackers when they least expect it
Can’t attend the webinar? Register anyway, and we’ll let you know when it is available on-demand.
Palo Alto
 
speaker
speaker
speaker
Director Of Services, Red Team
IOActive, Inc
Sr Mgr Threat Hunting
Palo Alto Networks
Editor In Chief & Co-Founder
Dark Reading
Having trouble viewing this email? View Web Version