Тёмный
No video :(

Using the MITRE ATT&CK Framework with Exabeam for Threat Hunting and Investigations 

Exabeam
Подписаться 11 тыс.
Просмотров 16 тыс.
50% 1

Опубликовано:

 

28 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 9   
@carlosceoofredlinequickshift
@carlosceoofredlinequickshift 4 года назад
Good content.
@tonymitchell1283
@tonymitchell1283 4 года назад
Really useful - Exabeam is a fantastic product, just wish it was a little more affordable!
@abhinav02111987
@abhinav02111987 3 года назад
Very nicely explained. Thank you.
@LeStupiak193
@LeStupiak193 4 года назад
Hi , can somebody tell me what is the abbreviation of AV signature mentioned in his keynote presentation ? A virus signature ?
@ExabeamSIEM
@ExabeamSIEM 4 года назад
Hi there. The AV signature refers to the virus signature, its unique data, or bits of code... almost like a fingerprint.
@LeStupiak193
@LeStupiak193 4 года назад
Exabeam thanks for brighten things up ! Im a user of exabeam ! Your videos are really helpful and informative ! Thanks a lot !
@gsrpavan1987
@gsrpavan1987 4 года назад
Hi Is there a way to auto populate CVE s and use the same for threat hunting??
@ExabeamSIEM
@ExabeamSIEM 4 года назад
Hi Pavan. CVEs are part of the Pre-Att&CK framework. In the Att&CK framework, Exabeam ties detections to TTPs. The approach is CVE agnostic since most exploitation of vulnerabilities involve a new process execution, lateral movement, covering tracks, etc. Our goal is to provide visibility into detecting threats using a dynamic approach such as TTPs instead of a static indicator like IoCs.
@MrEmityushkin
@MrEmityushkin 2 года назад
+
Далее
Leveraging User Behavior for Cyber Threat Hunting
38:01
I Took a LUNCHBAR OFF A Poster 🤯 #shorts
00:17
Просмотров 7 млн
Oh No! My Doll Fell In The Dirt🤧💩
00:17
Просмотров 10 млн
Woman = best friend🤣
00:31
Просмотров 2,6 млн
Breaking The Kill Chain: A Defensive Approach
13:18
Просмотров 159 тыс.
SOC 101: Real-time Incident Response Walkthrough
12:30
Просмотров 197 тыс.
MITRE Practical Use Cases
18:43
Просмотров 19 тыс.
Implementing MITRE ATT&CK into a SOC
29:12
Просмотров 17 тыс.
SANS Webcast: Effective (Threat) Hunting Techniques
54:01
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01
I Took a LUNCHBAR OFF A Poster 🤯 #shorts
00:17
Просмотров 7 млн