Since its inception, the security industry has been inundated with trendy defense techniques, topics, terms, and products that once implemented will solve all of our security woes. For the last several years one of those terms, threat hunting, has become the darling of defenders and vendors worldwide. But just what is threat hunting? Is it effective? Where do you even begin? This session will answer these questions and more when we discuss real life, immediately applicable, threat hunting techniques and methodologies. We’ll talk about hunting in network, as well as endpoint environments, and even who the right people on your team are to be your hunters. And finally, we’ll discuss several examples of security failures and data exposure found during actual threat hunting engagements on the networks of Black Hat and the RSA Conference.
Neil R. Wyler