From Ad Hoc to Automated: Proven Techniques to Operationalize Threat Hunting


Going on the hunt is oftentimes an ad hoc or reactive process. Many mature teams build targeted hunts into scheduled activities, but how do you move from an ad hoc effort to an operational function of your security program? 

Join Joe Moles, Red Canary's VP of Customer Security Operations, to learn: 

  • Strategies, team structure, and processes to help blue teams transform their threat hunting efforts 
  • How to justify the effort to advance from traditional monitoring to continuous threat hunting