Can I Use Machine Learning to
Automate the Network Hunt?
On-demand Webinar
On-demand Webinar
In this discussion, we present a new way of thinking about network threat hunting and AI. The common practice today is that most analysts search for attackers based on threat intelligence, signature rules passed between organizations and hunches. This requires labor intensive processes that are dependent on individual analysts and result in inconsistency in execution. This is an opportunity for attackers.
This discussion proposes an approach that holistically thinks about threat hunting from initial signals to closure; and how to create automated and repeatable patterns for a security team. Breaking from the usual threat hunting techniques centered around an analyst’s manual signature rule management and rule creation from threat intelligence, knowledge, and hunches. Instead evidence-based security research is used to train machine learning algorithms to provide vision and efficiency without significant labor and risking human error.
Vectra needs the information you provide to us to process your inquiry and to contact you about our solutions and products. You may unsubscribe from these communications at anytime. For more information check out the Vectra Privacy Policy.
Vectra a besoin des informations que vous nous fournissez pour traiter votre demande et vous contacter à propos de nos produits. Vous pouvez vous désabonner de ces communications à tout moment. Pour plus d'informations, consultez notre politique de confidentialité.
Vectra benötigt die Informationen, die Sie uns zur Verfügung stellen, um Ihre Anfrage zu bearbeiten und Sie bezüglich unserer Produkte zu kontaktieren. Sie können diese Mitteilungen jederzeit abbestellen. Weitere Informationen finden Sie in unseren Datenschutzbestimmungen.
Vectra needs the information you provide to us to process your inquiry and to contact you about our products. You may unsubscribe from these communications at anytime. For more information check out our Privacy Policy.