Endpoint Security , Next-Generation Technologies & Secure Development , Threat Hunting
Testing Visibility to Develop an Innovative Threat Hunting Program
Learn how to investigate data that can support a judgment call on whether activity is malicious or benign.Do you have the visibility you need to hunt for adversary techniques?
Increasing the quality and quantity of data analysis requires a robust set of tools, techniques, and best practices. However, you can learn how to use the MITRE ATT&CK framework to hunt for adversary techniques and build functional tests to understand visibility.
Hit play on the webinar above and learn how to:
- Hunt for frequently used ATT&CK techniques;
- Measure and improve visibility;
- Turn new intelligence into hunting criteria;
- Investigate data that can support a judgment call on whether activity is malicious or benign.