log analysis threat hunting

Webinar: 3 Challenges of Threat Hunting Using Log Analysis

Webinar Overview

The facts vs. myths of threat hunting

In this 3-part live webinar series, threat hunters from Infocyte discuss how to proactively hunt for unknown threats across the entire enterprise network at scale, with an approach called Forensic State Analysis (FSA). We compare FSA against three of the traditional methods of threat hunting that you have been told about are the “only” ways to perform threat hunting.

This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data or experts.

In Log Analysis vs FSA, you will learn about:

  • Challenges faced while threat hunting via the Log Analysis technique
  • Three advantages of using Forensic State Analysis (FSA) over Log Analysis
  • How Infocyte HUNT automates FSA to simplify and streamline the hunting process

View Webinar

  • This field is for validation purposes and should be left unchanged.
Posted in

Infocyte is an easy path to implement EDR or MDR for mid-size organizations. Learn more from Forrester's Now Tech Report here.

Interested in Sunburst and how to address compromises on your network?

Test out Infocyte's endpoint detection and response platform for free with our community edition: