Most IT and security professionals have heard of threat hunting – but few have seen it in action or fully understand how it works in the real world. That’s about to change.

In this on demand webinar, Jim Waggoner and Kevin O’Connor guide you through a hands-on threat hunting session, showing how they identify, investigate, and surface hidden threats across cloud and endpoint environments.

You’ll learn:

  • What threat hunting actually is (and how it differs from investigation)
  • How to uncover threats hiding in normal traffic
  • Why correlation across identity and endpoint data matters
  • What sets apart a mature, effective threat hunting capability

Please enter your contact info to view webinar

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a trial.

If this issue persists, please visit our Contact Sales page for local phone numbers.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site