Threat-Hunting-min.jpg
Webinars

Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search

Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.


Start Defending Together

See if you're a good fit for Collaborative Security. Contact us today for a free evaluation.

Start the Conversation

Vulnerability Management Solution Fact Sheet

Download our fact sheet to learn how our solution can eliminate security blind spots and help you make more informed decisions about business risks.

Download Our Fact Sheet