sans threat hunting and incident response summit

Building a Hunting Program at a Global Scale | 2020 Threat Hunting & Incident Response Summit

SaaS Hunting | 2020 Threat Hunting & Incident Response Summit

Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018

Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017

Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017

Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018

Evolving the Hunt: A Case Study in Improving a Mature Hunt Program - SANS Threat Hunting Summit 2019

SANS Threat Hunting & Incident Response Summit 2018

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

Lean Hunting - SANS Threat Hunting Summit 2018

Hunting Immaturity Model | 2020 Threat Hunting & Incident Response Summit

External Threat Hunters are Red Teamers | 2020 Threat hunting & Incident Response Summit

How to Submit a Threat Profile to MITRE ATT&CK - SANS Threat Hunting Summit 2018

Threat Hunting & Incident Response Summit & Training 2019 - Sneak Peek

Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017

Threat Hunting on the Cheap: Threat Hunting Summit 2016

Threat Hunting & Incident Response Summit & Training

The Mind of a Hunter: A Cognitive, Data-Driven Approach - SANS Threat Hunting Summit 2017

Hunting Powershell Obfuscation with Linear Regression | Threat Hunting & Incident Response Summit

Finding the Balance in Security Automation - SANS Threat Hunting Summit 2018

Framing Threat Hunting in the Enterprise - SANS Threat Hunting Summit 2017

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018

Hunting for IOCs with Gusto and Style!: Threat Hunting Summit 2016