Dabble or Deep Dive: 7 Different Threat Hunts You Can Do With Available Resources In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time. As just one example, a great type of threat hunting is to look for unrecognized/suspicious executables running on you network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can plunge in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch. We will take the same approach with a total of 7 types of threat hunting: Recognizing suspicious software Scripting abuse AV follow-up Lateral movement Persistence DNS abuse Bait-the-bad-guy LogRhythm is sponsoring this real training for free event and Nathan Quist (aka “Q”) is helping me on this event. Q is LogRythm’s Threat Research Engineer and works with LogRhythm’s internal SOC team and its clients to perform deep dives into their environments to uncover threats facing our industry.

Hora

19:00 - 20:00 hs GMT+1

Organizador

LogRhythm | The Security Intelligence Company
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Enero / 2020 391 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 30 de Enero de 2020
Mar 31 de Enero de 2020
Mié 01 de Enero de 2020
Jue 02 de Enero de 2020
Vie 03 de Enero de 2020
Sáb 04 de Enero de 2020
Dom 05 de Enero de 2020
Lun 06 de Enero de 2020
Mar 07 de Enero de 2020
Mié 08 de Enero de 2020
Jue 09 de Enero de 2020
Vie 10 de Enero de 2020
Sáb 11 de Enero de 2020
Dom 12 de Enero de 2020
Lun 13 de Enero de 2020
Mar 14 de Enero de 2020
Mié 15 de Enero de 2020
Jue 16 de Enero de 2020
Vie 17 de Enero de 2020
Sáb 18 de Enero de 2020
Dom 19 de Enero de 2020
Lun 20 de Enero de 2020
Mar 21 de Enero de 2020
Mié 22 de Enero de 2020
Jue 23 de Enero de 2020
Vie 24 de Enero de 2020
Sáb 25 de Enero de 2020
Dom 26 de Enero de 2020
Lun 27 de Enero de 2020
  • Mobile Banking Malware

    19:00 - 20:00 hs GMT+1

    Fecha
    Lun 27-Ene-2020, 19:00 - 20:00 hs GMT+1
    Descripción
    As people are constantly depending on their cell phones, cybercriminals have also focused their efforts and mobile banking malware has increasingly become a threat. In this webinar, Edan Cohen will discuss the two main types of mobile banking malware, mobile (...)
    Cerrar
  • Mobile Banking Malware

    19:00 - 20:00 hs GMT+1

    Fecha
    Lun 27-Ene-2020, 19:00 - 20:00 hs GMT+1
    Descripción
    As people are constantly depending on their cell phones, cybercriminals have also focused their efforts and mobile banking malware has increasingly become a threat. In this webinar, Edan Cohen will discuss the two main types of mobile banking malware, mobile (...)
    Cerrar
Mar 28 de Enero de 2020
Mié 29 de Enero de 2020
Jue 30 de Enero de 2020
Vie 31 de Enero de 2020
Sáb 01 de Enero de 2020
Dom 02 de Enero de 2020

Publicidad

Ofertas de empleo para profesionales IT en España y América Latina - TIC-Jobs.com

Ofertas de empleo IT, TIC, ERP, Consultor, Administrador, Programador, Desarrollador, Business Intelligence, BI, Business Process Management, BPM, CRM, Dynamics, ECM, RRHH, SAP, Sharepoint, WCM, Sharepoint, Navision, España, México, Argentina, Chile, Brasil,Perú

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado