RESOURCES

WEBINARS

Browse our recorded Webinars to learn how Infocyte HUNT automates the hunt process to quickly detect hidden compromises and reduce attacker dwell time.


Forensic State Analysis: A New Approach to Threat Hunting

In this recorded webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to scalably and proactively hunt for unknown threats across an entire enterprise network. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.


3 Flaws with the Defense in Depth Security Model and How to Improve It

Learn why the current defense in depth model, as it is applied in many organizations, leaves critical gaps which allow attackers to remain undetected. Explore the MITRE ATT&CK Model and how threat hunting and post-compromise detection address gaps to better protect your critical IT and data.