
To the untrained eye, it is a day like any other at the Jejune Institute. In fact, for most of the employees, it is a wholly unremarkable Wednesday punctuated only by occasional meetings that could have been emails, frequent breaks to the lunch room for much needed caffeine, and cold calls from unrelenting vendors.
But not for Peter.
Peter is a data worker at the Jejune Institute, and today, Peter is going to receive an email. That in itself is not remarkable. Like everyone, Peter receives hundreds of emails. But today this email seems to be from Peter’s boss. The email asks Peter to review a spreadsheet with this quarter’s top performer awards. Curious to see if his hard work has been rewarded, Peter opens the attachment, unleashing an attack on the organization’s endpoints and network that turns this unremarkable day into one that few will soon forget.
Join our Hunt Team, featuring Scott Poley from Intel 471, and Richard “Chit” Chitamitre from Corelight, for a fun, technical, and in-depth hunting session to pursue the adversary, identify their tactics, techniques, and procedures, and ultimately to uncover their nefarious objectives. This webinar will take participants on a journey demonstrating proactive threat hunting, showing techniques and strategies that organizations can start hunting with today!
Participants will experience:
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.