Get a Demo

Will you be the Hunter or the Prey?

Over 80 percent of all breach victims learn of a compromise from third-party notifications, not from internal security teams. In most cases, advanced threats have been present in an organization for months prior to detection, yet those organizations are still caught by surprise when the breach is discovered.

Adversaries continue compromising hundreds of enterprise systems even though incident response tactics and procedures have evolved rapidly in recent years. Computer Incident Response Teams (CIRTs) can no longer afford antiquated incident response techniques that fail to properly identify compromised systems, effectively contain the breach, and rapidly remediate the incident.

The Threat Hunting & Incident Response Summit 2016 focuses on specific hunting and incident response techniques and capabilities that can be used to identify, contain, and eliminate adversaries targeting your networks. Attend this summit to learn these skills directly from incident response and detection experts who are uncovering and stopping the most recent, sophisticated, and dangerous attacks against organizations.

SANS, in collaboration with advisory partner Carbon Black, is launching the Threat Hunting & Incident Response Summit 2016 to address a gap in the security landscape. Join us in New Orleans on April 12-13, 2016, to learn hunting and response techniques and strategies from the greatest threat hunters and responders in the information security community. After the two day Summit, choose from five world class SANS courses that will be offered to help you expand your information security expertise. SANS instructors are experienced industry practitioners considered to be among the best cybersecurity instructors in the world. They will provide you and your community with the expert guidance and skills you need to stop cyber-attacks against your organizations.

Together, we defend as one!

Exabeam provides security intelligence and management solutions to help organizations of any size protect their most valuable information.