Fastest Two Minutes in SecOps: Threat Hunting (Part 1)

Channel:
Subscribers:
274,000
Published on ● Video Link: https://www.youtube.com/watch?v=6LBx64hB7Is



Duration: 2:24
989 views
17


You give us two minutes, we'll give you the world of SecOps. In this episode, Google Cloud Principal Security Strategist John Stoner breaks down the merits of threat hunting and shares why, depending on the maturity of your detection and response capabilities, the practice may not be right for everybody.

Learn more → https://chronicle.security/




Other Videos By Google Cloud


2022-09-20Prevent Cyber Attacks and Reduce Time to Remediation
2022-09-19Fortinet and Google Cloud Better Together
2022-09-19How Booksy builds resilient architecture with CockroachDB on Google Cloud
2022-09-19Ulta Beauty: Reinventing retail with data, AI, and augmented reality
2022-09-16Ubuntu Pro for Google Cloud
2022-09-16Google Cloud and Chronicle help Morgan Sindall Group uncover previously invisible cyber threats
2022-09-16Google Cloud and Chronicle help BBVA imagine new security use cases
2022-09-15Overview of Google Cloud Backup and DR Service
2022-09-13Was ist wichtiger für Transformation: Geschäftsmodell oder Technologie?
2022-09-13Digitale Transformation: Können Business- und IT-Teams harmonieren?
2022-09-12Fastest Two Minutes in SecOps: Threat Hunting (Part 1)
2022-09-09Google Cloud Backup and DR - Importing Compute Engine Instance Backups
2022-09-09Google Cloud Backup and DR - Recovering Compute Engine Instances
2022-09-09Google Cloud Backup and DR - Creating backups of Compute Engine Instances
2022-09-09Google Cloud Backup and DR - Creating backup Plans for Compute Engine Instance backups
2022-09-09How To Rollback a Deployment in Google Cloud Deploy
2022-09-09How to Approve a Rollout in Google Cloud Deploy
2022-09-09Google Cloud Deploy How to View Artifact Differences
2022-09-09Setting up and using Anthos Service Mesh on Anthos Multicloud Clusters
2022-09-09Managing multi cloud K8s clusters using Anthos Config Management
2022-09-09Green technology and transformation



Tags:
Threat hunting
detection
security operations
SecOps