How to Pair Threat Hunting and Exploit Intelligence for Better Cybersecurity

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Better Together: Reduce Risk and Minimize Exposures to Exploitable Internet Targets

There are many ways an organization can reduce its attack surface in an effort to prevent vulnerabilities from becoming exploited. 

However, as the ecosystem of vulnerabilities continues to grow exponentially, so does the challenge of reducing the number of vulnerable internet targets that can compromise an organization without knowing it. 

Cybersecurity experts, including those from Censys and VulnCheck, will demonstrate how pairing capabilities in threat hunting and exploit intelligence can help teams:

  • Identify vulnerable internet targets and reduce attack surface
  • Filter exploitable vulnerabilities and build detections against them
  • Understand potential threat actor behaviors and the pathways to being attacked

Speakers

Photo of Jacob Baines

Jacob Baines

Chief Technology Officer, VulnCheck

Photo of David SooHoo

David SooHoo

VP of Product, Censys

Photo of Peter Wood

Peter Wood

Partner, Naturally Cyber LLP

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Censys here: https://censys.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.