Dabble or Deep Dive: 7 Different Threat Hunts You Can Do With Available Resources In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time. As just one example, a great type of threat hunting is to look for unrecognized/suspicious executables running on you network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can plunge in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch. We will take the same approach with a total of 7 types of threat hunting: Recognizing suspicious software Scripting abuse AV follow-up Lateral movement Persistence DNS abuse Bait-the-bad-guy LogRhythm is sponsoring this real training for free event and Nathan Quist (aka “Q”) is helping me on this event. Q is LogRythm’s Threat Research Engineer and works with LogRhythm’s internal SOC team and its clients to perform deep dives into their environments to uncover threats facing our industry.

Hora

19:00 - 20:00 hs GMT+1

Organizador

LogRhythm | The Security Intelligence Company
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Julio / 2025 271 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 30 de Julio de 2025
Mar 01 de Julio de 2025
Mié 02 de Julio de 2025
Jue 03 de Julio de 2025
Vie 04 de Julio de 2025
Sáb 05 de Julio de 2025
Dom 06 de Julio de 2025
Lun 07 de Julio de 2025
  • SonicPlatformでセキュリティ管理を簡単に

    02:00 - 03:00 hs GMT+1

    Fecha
    Lun 7-Jul-2025, 02:00 - 03:00 hs GMT+1
    Descripción
    MSPの皆様、究極の管理ソリューションをご覧ください。SonicWallのSonicPlatformで、すべてのデバイスの管理を、すべての場所で、すべての顧客に対して、単一の強力なコンソールから統合して効率化できます。 SonicPlatformはMSP専用に開発されており、複数のテナントやクライアントにわたってSonicWallのサイバーセキュリティツールを簡単にプロビジョニング、監視、制御できます。単一のダッシュボードで、ワークフローのシンプル化、応答時間の短縮、環境全体の完全な可視化が可能です。脅威に対する備えと運用の最適化のために、AIを利用したインサイトが活用されます。 SonicPlatformは、MSPがセキュリティを効率的に、シームレスに、大規模に管理する方法に変革をもたらしています。 いくらなんでも、そんなにいい話はないと思われた方は、この特別なCAFÉ TECHセッションで実際にご確認ください。きっと、ご覧になった後にはセキュリティ管理機能を強化する準備にとりかかるはずです!
    Cerrar
  • Simplify Security Management with SonicPlatform

    04:30 - 05:00 hs GMT+1

    Fecha
    Lun 7-Jul-2025, 04:30 - 05:00 hs GMT+1
    Descripción
    MSPs, meet the ultimate management solution. With SonicPlatform from SonicWall, you can unify and streamline the management of all devices across all locations for all customers—entirely from a single, powerful console. Built specifically for MSPs, SonicPlatform makes it effortless to provision, (...)
    Cerrar
Mar 08 de Julio de 2025
Mié 09 de Julio de 2025
Jue 10 de Julio de 2025
Vie 11 de Julio de 2025
Sáb 12 de Julio de 2025
Dom 13 de Julio de 2025
Lun 14 de Julio de 2025
Mar 15 de Julio de 2025
Mié 16 de Julio de 2025
Jue 17 de Julio de 2025
Vie 18 de Julio de 2025
Sáb 19 de Julio de 2025
Dom 20 de Julio de 2025
Lun 21 de Julio de 2025
Mar 22 de Julio de 2025
Mié 23 de Julio de 2025
Jue 24 de Julio de 2025
Vie 25 de Julio de 2025
Sáb 26 de Julio de 2025
Dom 27 de Julio de 2025
Lun 28 de Julio de 2025
Mar 29 de Julio de 2025
Mié 30 de Julio de 2025
Jue 31 de Julio de 2025
Vie 01 de Julio de 2025
Sáb 02 de Julio de 2025
Dom 03 de Julio de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado