The Facts vs Myths of Threat Hunting
In part 2 of our myth busting webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you may have been told are the “only” ways to perform threat hunting.
Feb 28: Part 2 - Why Endpoint Detection Doesn't Equal Threat Hunting
On Wednesday, February 28th, we will look at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. We will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.
In EDR vs FSA, you will learn about:
- The use cases for traditional Endpoint Detection
- Why you shouldn’t rely on the tools that got bypassed to find hidden attackers
- How to hunt at scale and simplify the threat hunting process using FSA