Webinar Download: Phishing Workflow & Best Practices

Everything You Need to Know About Phishing Triage 
 

phishing-threat-100691616-large

Not only are phishing attacks extremely prevalent, to make things worse they are a pain for analysts to mitigate.

By leveraging TruSTAR's email ingest feature, analysts can more efficiently review, analyze, and prioritize suspected phishing emails while also building a repository of organizational threat knowledge of phishing attacks and streamlining reporting of phishing attacks across sharing communities.

In this interactive training, TruSTAR Intelligence Architect Neal Dennis will demonstrate how to leverage email ingestion, graph visualizations, and enrichment to make faster decisions about the maliciousness of email-based threats.

Learn how to:

  • Set-up a comprehensive phishing triage system within your organization.
  • Aggregate intelligence produced by email security controls, such as gateway, security appliance, and organization phishing/abuse box.
  • Pull-in additional context beyond spam and scam emails so that analyst can understand the severity and risk of the threat in order to determine priority and what playbooks should be followed.

This live training webinar took place on: Tuesday, November 12, 2019.


 

More Workflow Training Sessions:

Splunk_square-logo  

Splunk ES Workflow Training

Stop drinking from the SIEM alert firehose. Respond to alerts faster by learning best practices on how to prioritize based on context and severity. Get the first look at TruSTAR's new Splunk ES integration.

Read More

 
ServiceNow_Square-logo  

Training: Case Management Workflow & Best Practices

When investigating and responding to alerts, security analysts need maximum context to make an informed decision on next steps as quickly as possible. Learn case management workflow best practices through TruSTAR's ServiceNow integrations.

Read More