Operationalizing Threat Intelligence, Part II: Threat Hunting & Incident Response

Logo
Presented by

Leo Sojref, Solutions Architect for External Risk Management at Check Point

About this talk

Incident response and threat hunting have a lot in common: they are typically components of a mature cyber program, they require access to high-fidelity threat intelligence data, and they provide significant value in terms of cyber risk reduction. The difference? With incident response, the team knows that a cyber incident has taken place. With threat hunting, the team hypothesizes that an incident has taken place but they are not certain. In this session, Leo Sojref, Solution Architect for External Risk Management at Check Point, will discuss how Incident Response professionals and Threat Hunters can improve their workflows and processes with CTI. Operationalizing threat intelligence as part of DFIR cases helps clearly define the scope of an incident, know which assets were affected, and accelerate mean time to recovery. Similarly, operationalizing threat intel helps Threat Hunters develop a realistic hypothesis, streamline hunting activities and log analysis, and uncover previously undetected threats. Join us at 10am EST / 4pm CET on Wed, July 16th for this 2nd session in a three-part series on Operationalizing Threat Intelligence. Part I: Continuous Monitoring & Detection is scheduled for Wed, June 18th. Register here: https://www.brighttalk.com/webcast/20101/641932 Part III: Threat Modeling & Security Preparedness is scheduled for Wed, Aug 13th. Register here: https://www.brighttalk.com/webcast/20101/641940
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (36)
Subscribers (4298)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
OSZAR »