̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Attendees took part in the ThreatOps Challenge, a capture the flag style webinar where they dove into a SentinelOne Singularity console filled with alerts, threats and hidden surprises. Each game zeroed in on a unique aspect of the platform, giving them hands-on experience across all its threat hunting capabilities.
During this webinar, attendees learned:
Throughout the webinar, attendees were guided by a series of questions that walked them through Incident Analysis, EDR Queries, advanced threat hunting techniques and more.
Fill out the form below to view this archived event.
Many organizations want to implement perimeter controls to help protect against unintended access and configuration errors through always-on guardrails. This whitepaper outlines the best practices and available services for creating a perimeter around your identities, resources, and networks in AWS.
Fill out the form below to view this Resource.