edr threat hunting challenges webinar

Webinar: 3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

This post was last updated on August 7th, 2019 at 03:15 pm

Webinar Overview: EDR vs FSA

In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

In EDR vs FSA, you will learn about:

  • The use cases for traditional Endpoint Detection & Response (EDR)
  • The challenges of using real-time detection tools to find hidden and malicious threats
  • How to hunt threats at scale and simplify the threat hunting process using FSA

View Webinar


  • Hidden
  • Hidden
  • Hidden
  • This field is for validation purposes and should be left unchanged.
Posted in