On Demand WEBINAR: Linux Threat Hunting Using MITRE ATT&CK Techniques

In this webinar we present tools for performing successful Linux Threat Hunting, including use cases and a review of a full hunting process from the initial step of choosing a hunting vector to a fine-tuned hunting query.

From time-to-time Verint (and its subsidiaries) would like to share information relating to future events, surveys about Verint, webinars, industry best practice and thought leadership with you. If you are happy for us to contact you please let us know how you would like us to contact you by confirming below:

I am happy to receive communications from Verint by email.

I am happy to be contacted by Verint by telephone.

Verint is committed to treat and protect your personal data in accordance with our Privacy Policy.