How to Create Intelligence from Anomalies and Patterns
What threats might you be missing by focusing too much on individual details rather than the full picture? Because we tend to have more information than time to make sense of it all, it’s important to consider different methods for digesting data, including some less obvious sources.
Highlights
In this 45-minute webinar, hear from security leaders from Ontic share the core elements of threat hunting, including:

Ways to Analyze the Holistic Data
Identify threat actors based on their communication in context

Sources for Data Intelligence
Discover the less traditional data sources

IoT Devices and Hardware
Establish a comprehensive view of integrated systems activity
Earn ASIS continuing professional education credits by watching this webinar.
Speakers

Fred Burton
Executive Director of the Center of Protective IntelligenceOntic

Tom Kopecky
Co-FounderOntic

Marisa Randazzo
CEOSIGMA
Earn ASIS continuing professional education credits by watching this webinar.