Join us for part 2 of the webinar series, Threat Hunting—A Practical Demonstration.
Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action.
For years some of us who have been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is.
As a follow up to the 26 March webinar, this presentation will take a deeper look at threat hunting and a demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Keatron EvansManaging Partner
KM Cyber Security, LLC
Instructor: Keatron Evans is the Managing Partner at KM Cyber Security, LLC, https://kmcybersecurity.com, and responsible for global information security consulting business which includes penetration testing, incident response management/consulting, digital forensics, and training.
Keatron is also a Senior Security Advisor at Savvius, and a top-rated instructor for ISACA a global association of 140,000 professionals in 180 countries that helps business and IT leaders maximize value and manage risk related to information and technology.
He is also one of the authors of Chained Exploits: Advancing Hacking Attacks from Start to Finish, a textbook still used by U.S. Government Security Agencies.