Proactive Threat Hunting with Tanium and Google Cloud Security

There are so many security tools that effectively block the bulk of cyberattacks. But sophisticated attackers are using these same tools, and are actively finding ways to exploit them. Many attacks go undetected and the industry gets lulled into a false sense of security. What do we do next?


Robert Correiro - ZOLL Medical
Shawn McDonald - Tanium

Additional Details:

Session Type: 

Products & Solutions: Threat Response

Difficulty: Beginner, Beginner-Intermediate, Intermediate, Intermediate-Advanced, Advanced

Focus: Security, Administrator, Operations, Risk