Threat detection by leveraging rules, signature, and machine learning.

Hosted By
IT users and M.

Details
- Three methods of threat detection.
- Detecting threats using prebuilt attack rules.
- Investigating cyberattacks with attack timelines using event correlation.
- What is the MITRE ATT&CK framework.
- Formulating a threat-informed defense using the MITRE ATT&CK framework.
- How machine learning can help detect behavior-based security threats.
- Spotting anomalous activities using user and entity behavior analytics.

ManageEngine's Cybersecurity Meetups
See more events
Online event
This event has passed
Threat detection by leveraging rules, signature, and machine learning.