<p>In this webinar, Sumukh Tendulkar, Sr. Director, Product Marketing and Edan Cohen, Cyber Threat Intelligence Specialist, at Cybersixgill discuss using dark web and closed sources to understand the motivation, social network and next action of an adversary.</p> <p>The threat hunting practice has helped security teams detect and reduce dwell time of stealth threats. But most hunting expeditions focus on threats - leaving the adversary free to launch another set of attacks with different tactics. We need to evolve threat hunting into a hunt for the adversary. The deep and dark web, and other closed sources, provide valuable insights into the motivations and activities of threat actors. </p> <p>Over the course of this session, we will understand:</p> <ol> <li>The motivation behind the actions of these actors</li> <li>Their social networks</li> <li>How to anticipate their next steps. </li> </ol> <p><strong>Watch on-demand today!</strong></p>
No items found.