Effective Threat Hunting: The Who, What, Where, When, Why and How — Part 2

Today, organizations need to proactively hunt for threats to their IT environments using threat hunting, a process that utilizes a combination of automation and human analysis for early detection and remediation of cyber attacks.  This is because traditional security practices cannot manage the threat of all cyberattacks.
For threat hunting to be effective, it’s critical to have the right tools and skilled staff in place. IBM provides such a threat hunting solution with a unique combination of people with experience and expertise backed by robust technology.
Join Thomas Bouve, Senior Threat Response Analyst, IBM X-Force, for the final session of the two part webcast series to understand the who, what, where, when, why and how using IBM managed detection and response services. Take a deep into the workings of the managed detection and response service from IBM during this session. You will also get an opportunity to see the service in action.
The first part of this webcast series which covers threat hunting basics and an overview of the managed detections and response service from IBM, can be accessed here.

 

Featured Speakers

Thomas Bouve

Senior Threat Response Analyst, IBM X-Force Services

IBM Security