News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS18 - How To: Threat Hunt (using your own data to identify threats)
#IMOS18 - How To: Threat Hunt (using your own data to identify threats)
Webinar
16:15 —
16:45, 11 September 2018
Speakers
Michael Hill
Former Editor
,
Infosecurity Magazine
Email Michael
Follow @MichaelInfosec
Mark Nicholls
Director of Cybersecurity
,
Redscan
Why Not Watch?
#IMOS18 - Advancements in Authentication: How Have Evolutions in Biometrics, Multi-Factor & Standards Changed the Authentication Landscape?
22:30 —
23:30, 12 September 2018
#IMOS18 - How To: Run a SOC (How to build and run a security operations center to improve security posture )
21:45 —
22:15, 12 September 2018
#IMOS18 - A Breach Too Far: Why Data Breaches are Getting Worse
17:00 —
18:00, 12 September 2018
#IMOS18 - CISO Interview; Paul Watts, Dominos
11:45 —
12:15, 11 September 2018
You may also like
Essential Elements Needed for a Successful Threat Hunt
Opinion
10 September 2018
Weaponized Data Breaches: Fueling a Global Cyber Cold War
Opinion
31 January 2020
Kevin Mandia: Nation-State Cyber Espionage Becomes the Norm
News
13 October 2015
Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds
News
29 June 2023
Google Report Reveals Russia's Elaborate Cyber Strategy in Ukraine
News
17 February 2023
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
News
16 December 2025
1
Motors WordPress Vulnerability Exposes Sites to Takeover
News
17 December 2025
2
Denmark Blames Russia for "Destructive" Cyber-Attacks
News
19 December 2025
3
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime
News
19 December 2025
4
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
News
18 December 2025
5
Millions of Car Owners Hit By Credit700 Data Breach
News
16 December 2025
6
Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News
2 December 2025
1
Helldown Ransomware Expands to Target VMware and Linux Systems
News
19 November 2024
2
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
News
16 December 2025
3
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
News
15 December 2025
4
New BeaverTail Malware Variant Linked to Lazarus Group
News
18 December 2025
5
Phishing Messages and Social Scams Flood Users Ahead of Christmas
News
16 December 2025
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6