Intel471-Logo-white.png
Resources

Webinars On-Demand

Threat-Hunting-Workshop-thumbnail.png

Threat Hunting Workshop 2: Persistence is Futile - Level 1

Join our team of threat hunting instructors for a unique and immersive threat hunting workshop.

Webinar-listing-thumbnail.png

Hunting for CONTI: TTPs Not IOCs

Join Intel 471's Scott Poley as he goes into a live threat hunt for the Conti ransomware using the latest threat intelligence reporting, and the very real pitfalls organizations face in trying to

Webinar-listing-thumbnail.png

Thinking Like a Threat Actor: Hunting the Ghost in the Machine

This webinar will demonstrate how organizations can overcome these internal blind spots, and hunt adversaries in real time across their network using telemetry from tools like NDR when coupled with ED

Threat-Hunting-Workshop-thumbnail.png

Begin Your Hunt: The Threat Hunting Workshop

That is why Intel 471 is offering a first-of-its-kind interactive threat hunting workshop where anyone can learn how to threat hunt in a safe, fun, and dynamic environment!

Webinar-listing-thumbnail.png

Brand Protection in Healthcare in Times of COVID-19

Webinar-listing-thumbnail.png

The Callback is Coming From Inside the House!

This webinar will demonstrate how threat hunting with EDR and NDR combined allows organizations to find what traditional security controls keep missing. It is guaranteed to terrify CISOs everywhere be

Intel-471-Logo-2024.png

Public Sector Threat Briefing

Intel-471-Logo-2024.png

Do You Even Threat Hunt, Bro? Hunting for WMIC Abuse

Join one of Intel 471's lead threat hunters, Scott Poley, as he demonstrates a technique used by adversaries and cyber criminals alike, by abusing WMIC to copy and execute payloads on remote endp

Intel-471-Logo-2024.png

Media & Telecommunications Threat Briefing

Industrial-Manufacturing-Webinar-On-Demand.png

Industrial & Manufacturing Threat Briefing

Webinar-listing-thumbnail.png

Do You Even Threat Hunt, Bro? Hunting For HiveNightmare (CVE-2021-36934)

Join one Intel 471's lead threat hunters, Lee Archinal, as he demonstrates hands-on practical session of true behaviorally-based threat hunting related to the vulnerability known as HiveNightmare

Intel-471-Logo-2024.png

Using Cyber Underground & Blockchain Intel to Stop Cyber Attacks

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.

Webinars On-Demand | Intel 471