The third session will round out our three part series where we have explored the theory behind, practical uses of and now the live performance of the threat hunting mission and the hunt forward approach to information collection and TTP proliferation. Built with the mindset of the security operator or asset owner, we’ll step you through each phase of the assessment and how best to consolidate your information to make the best use of that data.