Threat research can be an invaluable asset to security teams when attempting to formulate a proactive stance or reactive response. Whether the subject is a previously undocumented attack type or a new variant of a well-known threat, research can provide needed context and insight that help practitioners identify and resolve gaps in their security program in order to avoid being exploited. But techniques, methods, and actions found in threat research don’t always easily translate into practical steps you can take to prevent, detect, mitigate, or respond should a particular attack occur. While research can offer up specifics that can educate you on what occurs during an attack, what you really need is for those details to be transformed into strategies and actions based on the cybersecurity frameworks you rely on — including MITRE ATT&CK and NIST — to make the research truly valuable. So, how can you take third-party threat research and turn it into actionable takeaways for your specific team? During this on-demand webinar, Dan Kaiser and Sally Vincent from the LogRhythm Labs team walked through their process for reviewing third party reports using the real-world example of Maze ransomware, demonstrating how threat research can be truly useful in protecting your organization from the latest developments in cyberattacks. Specifically, they reviewed how to: - Turn threat details into new monitoring and threat hunting techniques - Configure your security solution to incorporate those actionable takeaways - Use samples of Maze that have been reverse engineered to test your newly configured solution They also demonstrated how to map third-party threat reports to ATT&CK techniques that can be used to develop mitigation, detection and response actions including: - Initial Access - Execution - Persistence - Privilege Escalation - Discovery - Lateral Movement - Impact Listen to this on-demand webinar to learn how to make the most of threat research.

Hora

11:00 - 12:00 hs GMT+1

Organizador

LogRhythm Europe & Middle East
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Enero / 2026 221 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 29 de Enero de 2026
Mar 30 de Enero de 2026
Mié 31 de Enero de 2026
Jue 01 de Enero de 2026
Vie 02 de Enero de 2026
Sáb 03 de Enero de 2026
Dom 04 de Enero de 2026
Lun 05 de Enero de 2026
Mar 06 de Enero de 2026
Mié 07 de Enero de 2026
Jue 08 de Enero de 2026
Vie 09 de Enero de 2026
Sáb 10 de Enero de 2026
Dom 11 de Enero de 2026
Lun 12 de Enero de 2026
Mar 13 de Enero de 2026
Mié 14 de Enero de 2026
Jue 15 de Enero de 2026
Vie 16 de Enero de 2026
Sáb 17 de Enero de 2026
Dom 18 de Enero de 2026
Lun 19 de Enero de 2026
Mar 20 de Enero de 2026
Mié 21 de Enero de 2026
Jue 22 de Enero de 2026
Vie 23 de Enero de 2026
Sáb 24 de Enero de 2026
Dom 25 de Enero de 2026
Lun 26 de Enero de 2026
Mar 27 de Enero de 2026
Mié 28 de Enero de 2026
Jue 29 de Enero de 2026
Vie 30 de Enero de 2026
Sáb 31 de Enero de 2026
Dom 01 de Enero de 2026

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado