Indicators of Compromise and Where to Find Them

Bit Ninja

Creating, using, and finding Indicators of Compromise from suspicious samples in Cisco AMP Threat Grid. This video shows an example of investigating a Locky ransomware sample.

Sign up for your free account here:

Duration: 3:58
Publisher: Cisco
You can watch this video also at the source.