Name
A4.Threat Hunting - How to Use Your Logs for Good
Date & Time
Wednesday, May 10, 2017, 9:25 AM - 10:25 AM
Mike Benjamin
Description
Session Description:
 
Massive volumes of logs are generated and collected in every company around the world on a constant basis. How often are you looking at them for threats? Monitoring of the SIEM has become the go-to security response method for too many companies. A resurgence of proactive searching for threats is upon us and people are calling it "threat hunting". Looking at your data is not new, but a reminder of how fruitful it can be may help prioritize it in your daily work.
 
 
Location Name
Room 709/711
Full Address
Colorado Convention Center
700 14th Street
Denver, CO 80202
United States
Category
Emerging Trends
Learner Objectives
After completing this session, the learner will understand what logs are interesting to collect, how to collect them, and types of searching that can be helpful. Specific examples of searching for current threats will be covered along with the tools and methods used to find them.
Speaker Bio(s)
Mike Benjamin is a member of the Threat Research Team at Level 3 Communications where he focuses on enumeration and cleanup of malicious infrastructure. His focus is on botnets, ransomware, and exploit kits - working to create forensic and data-led methods for detecting infrastructure that operates these points of malice.
 
Sorting Order
4