All Articles (384)
Sort by
Advanced threats can evade detection for months — and the longer they spend in the network, the more damage they can do. It leverages machine analytics and human-led intelligence analysis to proactively search for and find threats before they can c
Session Brief
This session was co-presented by 2speakers.
The first part by Wasim Halani included fundamentals, threat hunting approaches, elastic stack primer (elastic search, log stash, kibana, beats), concepts (nodes & cluster, index & shards,
Sponsor Collateral & Insert Guideline by 11th February, Monday
- Please provide 150 pieces of collateral to the address mentioned below
- You may provide 1 piece of collateral (as per service agreement) as delegate kit insert.
- You may provide 1 piece of
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join The Community View CISO Blogs