Tuning your SOC to Effectively Hunt Threats
In this session, we’ll discuss:
- How to assess your Threat Hunting maturity
- How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
- How to manage YARA rules and local Threat Intelligence to expose hidden threats
- How to create an Early Warning System to identify threats before they have a chance to proliferate