In today’s world, most security teams use threat intelligence reactively, reacting to each sign compromise. While this method is common, we want to pose a question to the attendees – why? Why wait for the unknown to hit you first?
In this presentation, we explore what it means to be proactive in your security measures. We discuss how threat hunting and utilizing Threat Intel produced by a threat library built around your environment can allow you to hunt the unknowns in your network.