This post was last updated on August 21st, 2020 at 10:04 am


Enjoy our pre-recorded webinars to learn more about proactive threat detection, incident response, security best practices, Managed Detection and Response, and our platform.

Webinar: 3 Challenages of Using EDR for Cyber Threat Hunting

Compare Forensic State Analysis detection techniques to traditional methods of cyber threat hunting—specifically Endpoint Detection and Response (EDR) software and the pitfalls of EDR threat hunting.

Webinar: Flaws in the Defense-in-Depth Security Model

The Defense-in-Depth security model and its gaps, which allow attackers to persist undetected. Using the MITRE ATT&CK Model learn how post-compromise detection helps protect you from a data breach.

Webinar: Common Pitfalls of Log Analysis Threat Hunting

Discover the pitfalls of Log Analysis threat hunting and common misconceptions associated with it. Learn how to detect threats without relying on sophisticated infrastructure and large teams of experts.

Webinar: Forensic State Analysis Threat Hunting Method

Experts from SANS Institute and Infocyte discuss adapting digital forensics and incident response techniques to proactively detect unknown threats within enterprise networks with Forensic State Analysis.