How to Create Intelligence from Anomalies and Patterns

What threats might you be missing by focusing too much on individual details rather than the full picture? Because we tend to have more information than time to make sense of it all, it’s important to consider different methods for digesting data, including some less obvious sources.

In this 45-minute webinar, hear from security leaders from Ontic share the core elements of threat hunting, including:

Ways to Analyze the Holistic Data

Identify threat actors based on their communication in context

Sources for Data Intelligence

Discover the less traditional data sources

IoT Devices and Hardware

Establish a comprehensive view of integrated systems activity


Fred Burton

Executive Director of Ontic's Center of Protective Intelligence

Tom Kopecky

Chief Strategy Officer and Co-Founder at Ontic

Marisa Randazzo