Register for a 30 minute webinar
Register to watch on-demand
Thank you for submitting!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage
Oops! Something went wrong while submitting the form.

SANS: Threat Hunting in Network Telemetry

Join SANS Senior Instructor Chris Crowley and Vectra AI Principle Security Engineer Dale O’Grady as they show you how to hunt for compromised assets within network telemetry.

60 minutes
March 22, 2021
Webinar
On-demand Webinar

SANS: Threat Hunting in Network Telemetry

Join SANS Senior Instructor Chris Crowley and Vectra AI Principle Security Engineer Dale O’Grady as they show you how to hunt for compromised assets within network telemetry.

60 minutes
March 22, 2021

SANS: Threat Hunting in Network Telemetry

Join SANS Senior Instructor Chris Crowley and Vectra AI Principle Security Engineer Dale O’Grady as they show you how to hunt for compromised assets within network telemetry.

60 minutes
March 22, 2021

SANS: Threat Hunting in Network Telemetry

Join SANS Senior Instructor Chris Crowley and Vectra AI Principle Security Engineer Dale O’Grady as they show you how to hunt for compromised assets within network telemetry.

60 minutes
March 22, 2021

SANS: Threat Hunting in Network Telemetry

Join SANS Senior Instructor Chris Crowley and Vectra AI Principle Security Engineer Dale O’Grady as they show you how to hunt for compromised assets within network telemetry.

60 minutes
March 22, 2021
Register for a free webinar
Register for a free on-demand webinar
Thank you for submitting!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage
Oops! Something went wrong while submitting the form.

In this on-demand webinar, you will learn:

  • 5 different hunting scenarios, and how to perform each
  • How to use AI to automate labor intensive tasks
  • How Vectra AI identifies problematic systems based on unexpected or unauthorized network activity
Share

Summary

In this on-demand webinar, you will learn:

  • 5 different hunting scenarios, and how to perform each
  • How to use AI to automate labor intensive tasks
  • How Vectra AI identifies problematic systems based on unexpected or unauthorized network activity
Share

Speakers

Speakers

Speakers

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Dale O’Grady
Host
Principal Engineer Competitive Intelligence

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai