Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016
Similar Tracks
Must Collect IOCs... Now What?!: Threat Hunting Summit 2016
SANS Digital Forensics and Incident Response
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
SANS Digital Forensics and Incident Response
Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017
SANS Digital Forensics and Incident Response
Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels
Sp4rkCon by Walmart
A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
SANS Digital Forensics and Incident Response
Updated FOR578: Training for Security Personnel and Why Intelligence Matters to You
SANS Digital Forensics and Incident Response
Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats
SANS Digital Forensics and Incident Response
Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017
SANS Digital Forensics and Incident Response
Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017
SANS Digital Forensics and Incident Response