So many security technologies are failing to detect targeted and directed adversaries. In this presentation we will talk about the need to start actively looking for these advanced adversaries in our networks. We will share a number of free tools and techniques that can be used to root out some of the most advanced bad guys today. This session is part 1 of 2.
- Introduction to Threat Hunting.
- Free tools to use.
- Advanced open source techniques for attacker attribution.
About John Strand
John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance and penetration testing. He is a coveted speaker and much loved SANS teacher. Strand is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.