When it comes to threat hunting, incident response, and other related activities, some sources of analysis and data are critical. Two of these are malware analysis and adversary infrastructure mapping. Each discipline is valuable on its own, but when combined, they can give your team extraordinary advantages in containing or blocking aggressive threat actors. Join SANS forensic expert Alissa Torres and DomainTools Director of Product Management Tim Helming to learn more about how you can apply these techniques to your own hunting, IR, and prevention strategies.