How to Create Intelligence from Anomalies and Patterns

What threats might you be missing by focusing too much on individual details rather than the full picture? Because we tend to have more information than time to make sense of it all, it’s important to consider different methods for digesting data, including some less obvious sources.

Highlights

In this 45-minute webinar, hear from security leaders from Ontic share the core elements of threat hunting, including:

Ways to Analyze the Holistic Data

Identify threat actors based on their communication in context

Sources for Data Intelligence

Discover the less traditional data sources

IoT Devices and Hardware

Establish a comprehensive view of integrated systems activity

Earn ASIS continuing professional education credits by watching this webinar.

Speakers

Fred Burton

Executive Director of the Center of Protective Intelligence
Ontic

Tom Kopecky

Co-Founder
Ontic

Marisa Randazzo

CEO
SIGMA

Earn ASIS continuing professional education credits by watching this webinar.