The Infocyte Blog

cyber endpoints bkg

On-Demand Webinar: Hunting for Sunburst Compromises

This post was last updated on August 10th, 2021 at 05:54 pmWednesday, December 23 Infocyte hosted a webinar with our Co-founder and Chief Product Officer, Chris Gerritz. Chris is a foremost expert in threat hunting and has done a significant amount of research around this recent backdoor and subsequent compromises. He’ll cover: Indicators to search…

Read More »
cyber security news headlines webinar

Webinar: 2018 Cybersecurity Headlines in Review

During this cybersecurity webinar, Michael Hill and Dan Raywood of Infosecurity Magazine (including a few guest speakers) review the cyber security trends of 2018, the impact of those trends, and some predictions for how those cyber security trends will impact us in 2019.

Read More »
edr threat hunting challenges webinar

Webinar: 3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

In this webinar, threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

Read More »
log analysis threat hunting

Webinar: 3 Challenges of Threat Hunting Using Log Analysis

This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data, and/or threat hunting experts.

Read More »
forensic state analysis threat hunting

Webinar: Forensic State Analysis – A New Approach to Threat Hunting

In this webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to proactively hunt for unknown threats across an entire enterprise network — at scale. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms threat hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.

Read More »
cyber security defense in depth model

Webinar: 3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Learn why the current Defense-in-Depth model, as it is applied in many organizations, leaves critical gaps which allow attackers to remain undetected. Explore the MITRE ATT&CK Model and how threat hunting and post-compromise detection address gaps to better protect your critical IT and data.

Read More »