Search Results
External Threat Hunters are Red Teamers | 2020 Threat hunting & Incident Response Summit
Hunting Immaturity Model | 2020 Threat Hunting & Incident Response Summit
Cybersecurity Threat Hunting Explained
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
Quantify Your Hunt: Not Your Parents’ Red Team - SANS Threat Hunting Summit 2018
Ask Us (Almost) Anything About Threat Hunting & Incident Response | SANS THIR Summit 2020
Hunting Powershell Obfuscation with Linear Regression | Threat Hunting & Incident Response Summit
BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019
Huntworld - SANS Threat Hunting & Incident Response Summit 2017
Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017
How to Build Threat Hunting into Your Security Operations | Red Canary
Toppling the Stack: Outlier Detection for Threat Hunters - SANS Threat Hunting Summit 2017