How to Implement a Risk-Based Strategy for "Killer" Threat Hunting Programs
Featuring a recent ransomware case study
Webinar Takeaways:
1. Elements of a threat hunting program
2. Utilizing NIST CSF and the Enterprise ATT&CK framework to build a forward-looking threat-hunting program
3. Applying the program against a recent ransomware attack
AVERTIUM | SHOW NO WEAKNESS™