OverWatch in Action: Demystifying the Threat Hunting Process
- Multiple Speakers
- Jason Wood
- Dwight Huell
Runtime: 24:26
You have likely heard of threat hunting, but what exactly is it? What is involved and how does it really work? How will it protect you? OverWatch sees a wide range of threat activity targeting companies around the world. This presentation will draw from OverWatch’s experience to provide insight into the hunting process. We will cover how hunting leads are generated, investigated and ultimately used to find activity by these threat actors. You will be armed with battle-tested information that will help you use threat hunting to better protect your organization from the adversary.
Please provide your feedback and be entered to win $300 on items from the CrowdStrike Swag Store! Winner will be contacted via email.
Related Videos
Tales From the Crypt 2020: Case Studies in Ransomware
Threat Hunting & Incident Response
Tales From the Crypt 2020: Case Studies in Ransomware
Multiple Speakers
CrowdStrike
16:12
Drinking from the Tap: Network Security Monitoring
Threat Hunting & Incident Response
Drinking from the Tap: Network Security Monitoring
Multiple Speakers
CrowdStrike
23:54
Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Threat Hunting & Incident Response
Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Tim Parisi
CrowdStrike
19:25
{Will be replaced by the modal content}