Browse our recorded Webinars to learn how Infocyte HUNT automates the hunt process to quickly detect hidden compromises and reduce attacker dwell time.
Visit our events page for our live webinars.
Myth Busting Webinar Series
Part 1: 3 Challenges of Threat Hunting with Log Analysis vs FSA
This on demand webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data or experts.
Forensic State Analysis: A New Approach to Threat Hunting
In this recorded webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to scalably and proactively hunt for unknown threats across an entire enterprise network. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.
3 Flaws with the Defense in Depth Security Model and How to Improve It
Learn why the current defense in depth model, as it is applied in many organizations, leaves critical gaps which allow attackers to remain undetected. Explore the MITRE ATT&CK Model and how threat hunting and post-compromise detection address gaps to better protect your critical IT and data.