How to Create Intelligence from Anomalies and Patterns
What threats might you be missing by focusing too much on individual details rather than the full picture? Because we tend to have more information than time to make sense of it all, it’s important to consider different methods for digesting data, including some less obvious sources.
Highlights
In this 45-minute webinar, hear from security leaders from Ontic share the core elements of threat hunting, including:
Ways to Analyze the Holistic Data
Identify threat actors based on their communication in context
Sources for Data Intelligence
Discover the less traditional data sources
IoT Devices and Hardware
Establish a comprehensive view of integrated systems activity
Earn ASIS continuing professional education credits by watching this webinar.
Speakers
Fred Burton
Executive Director of the Center of Protective IntelligenceOntic
Tom Kopecky
Co-FounderOntic
Marisa Randazzo
CEOSIGMA
Earn ASIS continuing professional education credits by watching this webinar.