A lot has been said about threat hunting, by a lot of people. They’ll tell you how difficult it is, what products you should use, how to automate the pain away, and how you should’ve been doing this all along. But here’s the thing…you have been doing it all along.

Key takeaways:
- What’s valuable and what isn’t in threat hunting
- Where to focus efforts when you’re looking for wrongdoers and results
- Practical tips on developing a threat hunting program
To watch more webcasts with Cyborg, check out our Threat Hunting Virtual Launch Event, focusing on threat intelligence and cyber threat emulation.