3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

Infocyte

In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.
Watch Now

Spotlight

In science, pressure is defined as the continuous physical force exerted on the per-unit area of a surface. There is an official formula, in case you were wondering: Pressure equals force divided by area. We interact with pressure from the moment we stretch in the morning to the moment we set our heads down at night. It ranges from the mundane and routine, like poking at our smartphones or scratching an itch, to the irritable, such as trying to undo a nettlesome jar of peanut butter or wearily finish a workout. In most cases, we apply pressure to something, complete the task and move on. Nearly all of the time, we don’t consciously register we are even doing it. But pressure is not as forgettable when it is the cerebral kind.

OTHER ON-DEMAND WEBINARS

Building Blocks for Your 2019 IT Security Program

AT&T

Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.
Watch Now

10 Incredible ways you can be hacked through email and how to stop the bad guys

WorkCast

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Navigating the Modern Security Landscape

As cyber criminals grow bolder and more sophisticated, their methods evolve. Join Allen Jenkins, InterVision’s CISO & VP of Cybersecurity Consulting, as he explores the modern security landscape. Allen will discuss recent cybersecurity attacks – including a synopsis of the attack, its impact and deconstructing how the attack happened – and a review of mitigation steps that could help organizations prepare for and respond to these types of attacks, including:
Watch Now

Security Weekly Webinar: Cyber Threat Intelligence – How to Do It Wrong

ThreatConnect

Tune in to watch Security Weekly’s Paul Asadoorian and John Strand discuss threat intelligence with Jason Cohen, Threat Intelligence Research Engineer at ThreatConnect. Learn about the shortcomings and misuses of threat intelligence to better understand how it can be used effectively and bring real value to your security operations.
Watch Now

Spotlight

In science, pressure is defined as the continuous physical force exerted on the per-unit area of a surface. There is an official formula, in case you were wondering: Pressure equals force divided by area. We interact with pressure from the moment we stretch in the morning to the moment we set our heads down at night. It ranges from the mundane and routine, like poking at our smartphones or scratching an itch, to the irritable, such as trying to undo a nettlesome jar of peanut butter or wearily finish a workout. In most cases, we apply pressure to something, complete the task and move on. Nearly all of the time, we don’t consciously register we are even doing it. But pressure is not as forgettable when it is the cerebral kind.

resources