Where to find Recorded Future at .conf23
-
Featured Session | Tuesday, July 18
SEC1633C | 10:30 AM - 11:15 AM PDT
Rock Em' SOC Em': Arming Security Analysts to Defeat Adversaries by Hunting for Threats with Sigma Rules
Cam Thorpe, Senior Manager, Professional Services - Recorded Future
Justin Grosfelt, Principle Malware Reverse Engineer - Recorded Future
Prior to dropping end-stage malware, threat actors escalate their attack by establishing persistence, escalating privileges or moving laterally. These tools leave log or file-based artifacts, allowing defenders to detect them. This session will demonstrate how to use Sigma rules, Splunk® Enterprise, Splunk® Enterprise Security, and Splunk® SOAR to detect and hunt malware-related activities. We’ll also discuss how our team investigates malware variants, identifies tools and tactics, techniques, and procedures (TTPs), and writes Sigma rules to catch them.
Skill Level: Intermediate
Roles: Security Analyst/Manager, SOC Manager/Director, Threat Researcher/Hunter
Products/Services: Splunk® Enterprise, Splunk® Enterprise Security, Splunk® Security, Orchestration, Automation and Response (SOAR)
-
source=*Pavilion | T310
Visit the Recorded Future booth T310
Get a close-up look at the new functionality with our integrations with Splunk Enterprise, Splunk Enterprise Security, and Splunk SOAR. We will also have copies of our exclusive research on hand to review with you.
Join our session in the source=*Pavilion on Tuesday at 5 PM
Speed Alert Triage with Operationalized Threat Intelligence in Your Security Workflows