Threat Hunting in Windows: How to Find the Adversary Before the Damage
About this Webinar
The approaches and goal of security have changed over the years. Security was once about preventing and stopping the adversary. Today, security has shifted to one main goal: control and reduce the amount of damage caused by the adversary. The area where most organizations are failing is timely detection. If an organization could identify the adversary early on in the compromise, the impact to the organization could be considerably reduced. The key to success is to shift from reactive approaches like incident response, to proactive approaches, most commonly referred to as threat hunting.
Join SANS Top 20 Critical Controls Author and industry-recognized security expert, Dr. Eric Cole in this upcoming webinar, where he will explore:
- How adversaries compromise a Windows system
- Methods of finding and tracking adversaries
- How to identify and reduce the dwell time of a compromise
- Metrics that can be used to track the effectiveness of security controls
Join Dr. Eric Cole and learn how to find the adversary, control the damage, and minimize the impact to your organization.