Webinar: 3 Challenges of Threat Hunting Using Log Analysis
This post was last updated on September 11th, 2019 at 03:15 pm
The facts vs. myths of threat hunting
In this 3-part live webinar series, threat hunters from Infocyte discuss how to proactively hunt for unknown threats across the entire enterprise network at scale, with an approach called Forensic State Analysis (FSA). We compare FSA against three of the traditional methods of threat hunting that you have been told about are the “only” ways to perform threat hunting.
This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data or experts.
In Log Analysis vs FSA, you will learn about:
- Challenges faced while threat hunting via the Log Analysis technique
- Three advantages of using Forensic State Analysis (FSA) over Log Analysis
- How Infocyte HUNT automates FSA to simplify and streamline the hunting process