Threat Hunting is the first in a series of steps – finding the traffic that might be malicious. But what’s next? How do we turn the potential threats into actions?
In this webcast, Bill Stearns will go over how to investigate the traffic, classify it, and handle it appropriately. We’ll look at the traffic in more detail, including how to capture more of it. We’ll also look at some excellent sources of information about the IP addresses in question. We’ll also look at whitelisting approaches to handle legitimate traffic for your environment.
This Webcast will be recorded. Join the THREAT HUNTING COMMUNITY Discord Server to engage with the presenters and your fellow attendees during the live session of the webcast: https://discord.gg/ypAJ4Ts