Back To Schedule
Friday, March 13 • 2:00pm - 2:50pm
I really wanna hear you say… ‘I threat hunt thaaat way.’”

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
If you’re still threat hunting like it’s 2011, you might be finding it about as fresh as yogurt left out in the desert from when the Backstreet Boys were still topping the charts. Yeah, IoCs can be interesting, but the very term itself describes fragmented historical activities that need to be pieced together in order to work out what the hell happened.       Outdated threat hunting procedures hold your security program back – both in the time it takes to seek out attacker behaviors, and the level of effort involved to ascertain whether or not the horse has indeed bolted.    In his talk, Andy will explain how to modernize and galvanize your threat hunting program, putting you in better stead to detect attacks earlier in the chain. He promises not to sing.    Audience Takeaways: Recognizing the gaps in traditional threat hunting Understanding of the tactics, techniques, or procedures (TTPs) of threat hunting Pairing TTPs with data analytics How to find unknown anomalies

avatar for John DiFederico

John DiFederico

John DiFederico is a lover of all things technology, but cybersecurity is his passion and the sole focus of his career. Currently serving as the Sales Engineering Manager at Exabeam, he works first hand with customers struggling to fully operationalize SIEM technologies. Prior to... Read More →