In this discussion, you’ll get:
-The difference between threat detection and threat hunting
-How to think like a hacker and counter-maneuver an attack
-Techniques for monitoring attacks and cyber threat hunting
Time to pull it together with a real-world example from our guest, threat hunter, and Graylog trainer, Adam "Abe" Abernethy. Hear of a successful security strategy, supported by a balance between cybersecurity, security hygiene, and a collaborative team.
In this discussion, you’ll get:
-The difference between threat detection and threat hunting
-How to think like a hacker and counter-maneuver an attack
-Techniques for monitoring attacks and cyber threat hunting
Follow Us:
GRAYLOG HEADQUARTERS
1301 Fannin St, Ste. 2000
Houston, TX 77002
GRAYLOG COLORADO
2101 Pearl St
Boulder, CO 80302
GRAYLOG LONDON
35 New Broad Street
London, EC2M 1NH
United Kingdom
GRAYLOG GERMANY GMBH
Poolstraße 21
20355 Hamburg, Germany
© 2023 Graylog, Inc.All rights reserved