Threat Hunting: Real Intrusions by State-Sponsored and eCrime Groups

Webinar Registration

“Threat hunting” is a term getting thrown around a lot in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? Is threat hunting the same thing as incident response? How would an organization start doing threat hunting? Get ready to find out in this real training for free event.

In this webcast we are going to dive into what threat hunting means and how you can use it to actively find intrusions. We will discuss how to use it effectively and then look at techniques being used in actual intrusions.

You will see intrusions that were executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplished, and how the bad guys attempted to avoid discovery. These techniques will include how the attackers:

  • Establish persistence to stay in a network
  • Move laterally to other hosts
  • Evade defenses and stay undetected
  • Compromise additional credentials and move deeper into the environment

As we discuss each intrusion, we will discuss some threat hunting techniques that can be used to discover the attacks used. You can then use this information to start doing your own threat hunting.

Attendees will learn:

  • What threat hunting is, it’s benefits and how it’s different than other activities
  • Targeted intrusion techniques recently observed in the wild
  • How to use threat hunting to discover threat actors before they accomplish their objectives

Jason Wood, a Senior Researcher in Tactical Intelligence at our sponsor CrowdStrike, is my guest for this technical session. Afterwards Jason will briefly show you how Falcon OverWatch provides proactive managed hunting services to prioritize and respond to urgent threats.

Please join us for this real training for free session.

First Name:   
Last Name:   
Work Email:  
Phone:  
Job Title:  
Organization:  
Country:    
State:  
 

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.

 

 

Additional Resources