Watch practitioners from ThreatConnect, King & Union, and HYAS demonstrate an investigation and share best practices as they weave together their tools to locate adversary infrastructure.  Starting from a single phishing email, the team explains the process of identifying other indicators of compromise (IOCs) along with adjacent adversary infrastructure that can be blocked. 

Request a Demo