Real-life Cases of Improving Threat Hunting Capabilities presented at CyberCrimeCon 2019

by Narudom Roongsiriwong,

Summary : Logs are the digital footprint of activities at the points where events occur. Nowadays, we have to investigate large amounts of log data from various sources for threat hunting. This presentation will describe system design guidelines to make threat hunting more efficient in terms of detection time, accuracy of threat identification, and digital forensics.