Webinar 1: Log Analysis vs FSA for Threat Hunting
In this 3-part live webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you have been told about are the “only” ways to perform Threat Hunting.
The first webinar will look at Log Analysis, and show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data or experts.
In Log Analysis vs FSA, you will learn about:
- Challenges faced while performing Log Analysis
- 3 advantages of using FSA over Log Analysis
- How Infocyte HUNT automates FSA to simplify and speed the hunt process