Threat hunting has rapidly emerged as a popular new means to find and discover advanced cyber threats. Proactive hunting differs from most security practices as it focuses on finding tactics, techniques, and procedures indicative of malicious activity – a much more consistent way to identify threats than by solely relying on static Indicators of compromise.

Join a panelist of security experts and threat hunters from the IBM X-Force team to get insight on elements of a good threat hunt program.  Attendees will gain insight into threat hunt methodology, industry best practices and recommendations, as well as some real-world use cases and findings that prove the value of a proactive hunt program.