Skip to Main Content

Threat Hunting Lessons You Won’t Learn From Guides and Whitepapers

Join TrustedSec Incident Responders Justin Vaicaro, Leo Bastidas, and Ashley Pearson as they share anecdotes and practical information about their experiences while conducting Threat Hunting engagements.

By Justin Vaicaro and Leo Bastidas
February 16, 2022
Threat Hunting

Threat Hunting is the process of proactively searching an organization’s network for malicious activity that evades existing security monitoring, detection, and alerting. If done properly, Threat Hunting can be one of the most effective ways to identify evidence of malicious activities and provide ongoing tactical threat detection capabilities that are specific to the organization.

To provide organizations with the best chance at utilizing strong Threat Hunting methodology as part of their security programs, we’ve published a guide on how we approach Threat Hunting engagements and regularly share updates on the topic through blog posts and discussions on Twitter and Discord. In this webinar, we’ll go behind-the-scenes to share our experiences in developing an industry-leading Threat Hunting program.

During the webinar, you’ll learn:

  • How our Threat Hunting methodology was developed
  • What we’ve learned through years of leading Threat Hunting engagements
  • Why Threat Hunting is so effective as a proactive security measure
  • How to handle the most common roadblocks and hurdles
  • Where to find the resources that we use for Threat Hunting
  • The best times to begin Threat Hunting
  • How Threat Hunting can be used to detect attackers exploiting new vulnerabilities such as Log4j
  • Real-world tricks of the trade that could benefit future Threat Hunters

Join TrustedSec Incident Responders Justin Vaicaro, Leo Bastidas, and Ashley Pearson as they share anecdotes and practical information about their experiences while conducting Threat Hunting engagements. All attendees will receive a complimentary copy of the TrustedSec guide to successful Threat Hunting, “Are the Attackers Out of Our Network?”