Home Blog Threat Hunting In Today's Threat Landscape Threat Hunting In Today’s Threat Landscape December 17, 2019 Recorded Webinar Hosted by Redmond presented by: Michael Scutt Michael Scutt, BlueVoyant’s Director of Hunting Operations, has spent over 10 years in incident response and threat hunting. In this webinar, Michael will: Detail the roles and responsibilities of today’s threat hunting Discuss the evolving threat landscape from automated ransomware attacks to “hand-on-keyboard” targeted attacks that are evading traditional defenses Cover how threat hunting tactics, techniques, and procedures need to evolve to help security teams and SOCs protect their sensitive data and business operations in this perilous environment. Share: Facebook Twitter LinkedIn Related reading Resources Sign up for our Cyber Security Model Certification (CMMC) Newsletter Sign up for our Cyber Security Model Certification (CMMC) Newsletter The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity… Read more News Cybersecurity Veteran James M. Aquilina Joins BlueVoyant as Member of Advisory Board and Advisor to the CEO Visionary leader Aquilina brings deep expertise in building world class growth stage incident response, digital forensics, threat intelligence, and… Read more Video Migrating to a Cloud-Based SIEM An in-depth discussion and deep dive into Microsoft Azure Sentinel with BlueVoyant’s Robert Hannigan, Micah Heaton, and also featuring Managed… Read more Recommended reading Resources Sign up for our Cyber Security Model Certification (CMMC) Newsletter Sign up for our Cyber Security Model Certification (CMMC) Newsletter The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity…
December 17, 2019 Recorded Webinar Hosted by Redmond presented by: Michael Scutt Michael Scutt, BlueVoyant’s Director of Hunting Operations, has spent over 10 years in incident response and threat hunting. In this webinar, Michael will: Detail the roles and responsibilities of today’s threat hunting Discuss the evolving threat landscape from automated ransomware attacks to “hand-on-keyboard” targeted attacks that are evading traditional defenses Cover how threat hunting tactics, techniques, and procedures need to evolve to help security teams and SOCs protect their sensitive data and business operations in this perilous environment. Share: Facebook Twitter LinkedIn Related reading Resources Sign up for our Cyber Security Model Certification (CMMC) Newsletter Sign up for our Cyber Security Model Certification (CMMC) Newsletter The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity… Read more News Cybersecurity Veteran James M. Aquilina Joins BlueVoyant as Member of Advisory Board and Advisor to the CEO Visionary leader Aquilina brings deep expertise in building world class growth stage incident response, digital forensics, threat intelligence, and… Read more Video Migrating to a Cloud-Based SIEM An in-depth discussion and deep dive into Microsoft Azure Sentinel with BlueVoyant’s Robert Hannigan, Micah Heaton, and also featuring Managed… Read more Recommended reading Resources Sign up for our Cyber Security Model Certification (CMMC) Newsletter Sign up for our Cyber Security Model Certification (CMMC) Newsletter The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity…
Resources Sign up for our Cyber Security Model Certification (CMMC) Newsletter Sign up for our Cyber Security Model Certification (CMMC) Newsletter The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity… Read more
News Cybersecurity Veteran James M. Aquilina Joins BlueVoyant as Member of Advisory Board and Advisor to the CEO Visionary leader Aquilina brings deep expertise in building world class growth stage incident response, digital forensics, threat intelligence, and… Read more
Video Migrating to a Cloud-Based SIEM An in-depth discussion and deep dive into Microsoft Azure Sentinel with BlueVoyant’s Robert Hannigan, Micah Heaton, and also featuring Managed… Read more
Resources Sign up for our Cyber Security Model Certification (CMMC) Newsletter Sign up for our Cyber Security Model Certification (CMMC) Newsletter The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity…