What People are Saying

How to Embed a Tweet

  1. Click on the (...) icon at the bottom of the tweet you wish to embed
  2. Click "Embed Tweet"
  3. Copy the selected text
  4. Paste the copied code into one of the Tweet boxes above

Section 4 Title

In bibendum nisi ante, et ornare nisl viverra in. Nullam tristique, justo ut consectetur facilisis, dui ligula rutrum tortor, et laoreet tortor libero nec neque. Sed dictum mollis volutpat. Nam nec dui dictum, bibendum felis ultrices, pretium lorem. Quisque sed eros eu ipsum pharetra convallis at a massa.

Section 5 Title

In bibendum nisi ante, et ornare nisl viverra in. Nullam tristique, justo ut consectetur facilisis, dui ligula rutrum tortor, et laoreet tortor libero nec neque. Sed dictum mollis volutpat. Nam nec dui dictum, bibendum felis ultrices, pretium lorem. Quisque sed eros eu ipsum pharetra convallis at a massa.

Threat Hunting with Windows

Event IDs

Webinar

Taking a look at Threat Hunting and how it has evolved as a practice


Presenter

Greg Longo - Threat Analyst, JASK

Brian Gardiner - Threat Analyst, JASK

Duration

55 MIN

Details

In this webinar, attendees will learn:

  • What is Threat Hunting?
  • What is the methodology behind Threat Hunting? 
  • How to leverage Windows event logs to surface malicious activity? 
  • What are basic Threat Hunting strategies? 

Register now


To our customers: We'll never sell, distribute or reveal your email address to anyone. Privacy Policy