SANS 2022 Threat Hunting Survey - Hunting for a Standard Methodology for Threat Hunting Teams Published -- Download video MP4 360p Recommendations 33:41 My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019 31:15 Cybersecurity Architecture: Who Are You? Identity and Access Management 1:04:00 Is Skynet watching you already? 1:49:55 How To Speak Fluently In English About Almost Anything 36:21 Think Faster, Talk Smarter with Matt Abrahams 54:29 Overview of STIX 2.1 for Cyber Threat Analysis 1:26:17 Lecture Series in AI: “How Could Machines Reach Human-Level Intelligence?” by Yann LeCun 01:00 How to Remember EVERYTHING you read 17:34 Cybersecurity Architecture: Five Principles to Follow (and One to Avoid) 2:04:31 How To Keep Talking In English, Instead Of Getting Stuck 1:58:38 Geoffrey Hinton | Will digital intelligence replace biological intelligence? Similar videos 2:01:41 SANS 2022 Cyber Threat Intelligence Survey 06:51 Cybersecurity Threat Hunting Explained 11:36 Threat Hunting Methodology - Part 1 32:57 Open Threat Research - The Hunt for Red Apples: How to threat hunt and emulate Ocean Lotus on macOS 43:34 Keynote: Threat Hunting: Old Data, New Tricks! 39:18 Threat Hunting in Microsoft 365 Environment 58:44 SANS Threat Analysis Rundown | Katie Nickels 33:17 BSidesGVL 2021 - Nick Sweet - "Pretty Easy Threat Hunting" 23:44 Detectree – data visualization for threat hunting, presented by Tom Barrow & Giulio Ginesi 34:08 This is going to hurt threat hunting with the Pyramid of Pain 1:00:28 Threat hunt with network evidence with endpoint telemetry 1:02:53 Leveraging Managed Threat Hunting for an Effective ICS/OT Cybersecurity Program More results