Webinars

Watch our pre-recorded webinars to learn more about threat hunting, our cyber threat hunting platform, securing your endpoints, defensive cybersecurity tactics, and eliminating attacker dwell time.

Webinars

Webinar: 3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

In this webinar, threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

View Webinar Now »

Webinar: 3 Challenges of Threat Hunting Using Log Analysis

This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data, and/or threat hunting experts.

View Webinar Now »

Webinar: Forensic State Analysis – A New Approach to Threat Hunting

In this webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to proactively hunt for unknown threats across an entire enterprise network — at scale. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms threat hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.

View Webinar Now »

Webinar: 3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Learn why the current Defense-in-Depth model, as it is applied in many organizations, leaves critical gaps which allow attackers to remain undetected. Explore the MITRE ATT&CK Model and how threat hunting and post-compromise detection address gaps to better protect your critical IT and data.

View Webinar Now »

Got a great idea for a webinar topic?