Using legacy, “on-prem” security strategies to combat today’s threats is like bringing a knife to a gunfight. Threat actors have been perfecting the art of evading security controls for years and we see the results in headlines all the time. This session dives into network-based threat hunting and how it can be implemented within an organization’s security strategy.
Most organizations are going through a digital transformation journey, either planned one or one of circumstances. But how many organizations are making sure that this journey also includes security transformation? Most organizations have been using the same security tools and techniques for over a decade, but their infrastructure and threats targeting them have changed and evolved. They are bringing a knife to a gunfight! Endpoint AV? Sandboxes? Siloed threat intel feeds? Threat actors today have proven over and over they can bypass these strategies.
- Learn how today’s threats evade security detection and see how they’ve evolved over time.
- Understand how to better utilize current capabilities in a network-based threat hunting program to fit today’s threats. It’s not all about new features but rather how to deploy and use them!
- Hear several tactical and practical use case techniques to help detect and mitigate today’s threats.
- Begin thinking about a cloud security strategy – a cloud environment cannot be protected with the tools and techniques of the “on-prem” days.