Join battle-tested threat hunter Sid Pearl to learn how to use cyber threat intelligence to proactively hunt advanced threats that evade detection. Discover how military intelligence analysis methodologies are now being adopted by the SOC to defeat advanced adversaries in cyberspace.

On Demand until

Event Details

Know Your Enemy: Proactive Cyber Threat Intelligence and Threat Hunting


Available On Demand until