{"id":23893,"date":"2023-02-13T15:00:18","date_gmt":"2023-02-13T13:00:18","guid":{"rendered":"https:\/\/datanets.ro\/datanet-event-threat-hunting-with-cisco-security\/"},"modified":"2025-03-11T19:02:54","modified_gmt":"2025-03-11T17:02:54","slug":"datanet-event-threat-hunting-with-cisco-security","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/datanet-event-threat-hunting-with-cisco-security\/","title":{"rendered":"Datanet event: Threat Hunting with Cisco Security"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>The series of practical events organized by Datanet Systems continued in February with a laboratory dedicated to Threat Hunting operations with Cisco Security tools, a vast field that involves not only a strategic approach but also multiple cybersecurity technologies and solutions. <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Supported by Bogdan Ghi\u0163\u0103 and Cristi Marinescu, Presales consultants, the lab included theoretical presentations on the Security Operations Center (SOC)-Threat Hunting relationship and the recommended Cisco solutions, as well as a workshop on an incident investigation with Cisco Security. <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-23882\" title=\"Threat Hunting\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco.jpg\" alt=\"\" width=\"939\" height=\"536\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco.jpg 2048w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco-300x171.jpg 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco-1024x585.jpg 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco-768x438.jpg 768w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco-1536x877.jpg 1536w\" sizes=\"(max-width: 939px) 100vw, 939px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Why do we need Threat Hunting<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The reality shows that there are multiple organized cybercrime groups, skilled and with access to powerful technologies, that actively but discreetly work to find and exploit vulnerabilities in the IT systems of targeted organizations. Being practically impossible to cover all attack surfaces, Threat Hunting precisely aims to identify and remove attacks that have penetrated the security perimeter, without attracting attention and triggering alarms. It&#8217;s a different approach than traditional security incident investigation, which is triggered after a malicious activity is detected.<\/p>\n<p style=\"text-align: justify;\">Threat Hunting operations involve multiple techniques of data mining, clustering, grouping, and stack counting, and the results are directly proportional to the data collected, the tools available, and the experience of the investigator. In Threat Hunting, the main objective is not to block the attack, for this, there are already other tools, but rather to understand the context and how an attacker or malware acts inside the network.<\/p>\n<p style=\"text-align: justify;\">Through Threat Hunting, security teams discover which systems have been affected, if data has been compromised or exfiltrated, if the malware involved will resist remediation measures, or which vulnerabilities need to be fixed to avoid similar incidents in the future.<\/p>\n<p style=\"text-align: justify;\">Threat Hunting operations have multiple levels of maturity, depending on the degree of routine, in terms of data collection and the level of automation of analysis procedures<span style=\"font-size: 16px;\">.<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-23880 size-full\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-1.png\" alt=\"\" width=\"1256\" height=\"510\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-1.png 1256w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-1-300x122.png 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-1-1024x416.png 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-1-768x312.png 768w\" sizes=\"(max-width: 1256px) 100vw, 1256px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">At the same time, the Threat Hunting approach differs depending on the providers. For Cisco Security, the &#8220;<em>kill chain<\/em>&#8221; flow includes several stages, each with associated specific attack and defense elements.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"font-size: 16px;\"><strong>Recon<\/strong> \u2013 attackers collect data and learn the target organization&#8217;s IT system. In the case of ransomware, phishing is the specific attack at this stage.<\/span><\/li>\n<li><span style=\"font-size: 16px;\"><strong>Stage<\/strong> \u2013 the attack of malicious applications is prepared.<\/span><\/li>\n<li><span style=\"font-size: 16px;\"><strong>Launch<\/strong> \u2013 the attack is launched after accessing a malicious link.<\/span><\/li>\n<li><span style=\"font-size: 16px;\"><strong>Exploit<\/strong> \u2013 a device takeover vulnerability is exploited.<\/span><\/li>\n<li><span style=\"font-size: 16px;\"><strong>Install<\/strong> \u2013 the actual installation of malware.<\/span><\/li>\n<li><span style=\"font-size: 16px;\"><strong>Call Back<\/strong> \u2013 command flow and data encryption in case of ransomware attacks.<\/span><\/li>\n<li><span style=\"font-size: 16px;\"><strong>Persistent<\/strong> \u2013 removing data from the system or blocking access to commands or data.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">For each stage, Cisco offers dedicated solutions such as Secure Endpoint, Umbrella, and DUO integrated with the<a href=\"https:\/\/datanets.ro\/en\/is-your-it-security-architecture-too-complex-its-time-to-test-cisco-securex\/\"><strong>\u00a0<u>SecureX<\/u><\/strong><\/a> platform, supported by information from the <strong>Cisco\u00a0Talos\u00a0Intelligence Group<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-23878 size-full\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-2.png\" alt=\"\" width=\"1261\" height=\"711\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-2.png 1261w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-2-300x169.png 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-2-1024x577.png 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Grafic-2-768x433.png 768w\" sizes=\"(max-width: 1261px) 100vw, 1261px\" \/><\/p>\n<p style=\"text-align: justify;\">One of the most used Cisco tools in Threat Intelligence scenarios is <strong>Orbital Advanced Search<\/strong>, a component of <a href=\"https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/endpoint-security\/secure-endpoint\/index.html\"><strong><u>Cisco Secure Endpoint<\/u><\/strong><\/a>, available in Advantage and Premier Licenses. Orbital enables advanced queries at the endpoint level, based on a catalog of over 200 predefined queries, and, integrated with SecureX Threat Response, significantly improves response time in the event of a Threat Hunting investigation by quickly identifying affected systems.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Threat Hunting and Security Operations Center<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Securitatea cibernetic\u0103 este o combina\u021bie de oameni, procese \u0219i tehnologii care lucreaz\u0103 \u00eempreun\u0103 la atingerea obiectivelor. Nici Threat Hunting nu face excep\u021bie, asigur\u00e2nd un nivel ridicat de eficient\u0103 atunci c\u00e2nd este integrat \u00eentr-un <a href=\"https:\/\/datanets.ro\/en\/it-integration-services\/security-infrastructure-as-a-service-from-datanet\/\"><strong><u>Security Operations Center<\/u><\/strong><\/a> . Why?<\/p>\n<p style=\"text-align: justify;\">Because threats can be monitored more effectively when all data and security experts are grouped together and act as one. In a SOC, available services and work procedures are better documented, and resources are grouped by levels of expertise. At the same time, the advantage of a SOC resides in <strong>SOAR (Security Orchestration, Automation, and Response)<\/strong> platforms that allow an organization to collect threat data and respond to incidents without human assistance.<\/p>\n<p>SOAR\u2019s benefits:<\/p>\n<ul>\n<li>End-to-end orchestrated workflows<\/li>\n<li>Automated tasks by integration with various tools<\/li>\n<li>Automatic reaction to security incidents<\/li>\n<li>Metrics and performance indicators based on continuously collected data<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Automation is also key in Threat Intelligence because the analyst no longer has to observe a certain situation\/behavior, but the system reacts automatically by correlating several indicators. Moreover, a Security Operations Center involves the development and continuous improvement of services, and this is a Threat intelligence approach that, through retrospective analysis (facilitated by Cisco Secure Endpoint, for example), allows new decisions to be made based on information we. <strong>That is, exactly the flexibility that any organization needs to deal with today&#8217;s cyber threats.<\/strong><\/p>\n<p style=\"text-align: justify;\">However, beyond the theoretical approach, the main gain of participating in such an event is the involvement in practical hands-on laboratories, as being the best opportunity to understand how Cisco tools work, to get familiar with the interfaces, and especially with the work procedures. Investigating incidents with Cisco Security solutions is a complex process that requires know-how and experience, but delivers the desired results.<\/p>\n<p style=\"text-align: justify;\">If you want to participate in the hands-on events organized by Datanet Systems or need information about Cisco Security contact us at<span style=\"font-size: 16px;\">\u00a0<\/span><a style=\"font-size: 16px; background-color: #ffffff;\" href=\"mailto:sales@datanets.ro\">sales@datanets.ro<\/a><span style=\"font-size: 16px;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About Threat Hunting with solutions and services from the Cisco Security suite!<\/p>\n","protected":false},"author":9,"featured_media":23883,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[37],"tags":[250,305,53,306,248,165,295,209],"class_list":["post-23893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lastest-news","tag-automation-en","tag-cisco-secure-endpoint-en","tag-cisco-umbrella-en","tag-cisco-xdr-en","tag-cybersecurity-en-2","tag-efficiency","tag-hybrid-cloud-en-2","tag-it-security-architecture-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Datanet event: Threat Hunting with Cisco Security<\/title>\n<meta name=\"description\" content=\"Datanet Systems event: Threat Hunting with Cisco Security suite!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datanet Systems event: Threat Hunting with Cisco Security suite!\" \/>\n<meta property=\"og:description\" content=\"Datanet Systems event: Threat Hunting with Cisco Security suite!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T13:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-11T17:02:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco-2-1024x575.jpg\" \/>\n<meta name=\"author\" content=\"Vasile Gabriel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasile Gabriel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/\"},\"author\":{\"name\":\"Vasile Gabriel\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\"},\"headline\":\"Datanet event: Threat Hunting with Cisco Security\",\"datePublished\":\"2023-02-13T13:00:18+00:00\",\"dateModified\":\"2025-03-11T17:02:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/\"},\"wordCount\":844,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Eveniment-Cisco.jpg\",\"keywords\":[\"Automation\",\"Cisco Secure Endpoint\",\"Cisco Umbrella\",\"Cisco XDR\",\"Cybersecurity\",\"Efficiency\",\"Hybrid cloud\",\"IT Security Architecture\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/\",\"name\":\"Datanet event: Threat Hunting with Cisco Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Eveniment-Cisco.jpg\",\"datePublished\":\"2023-02-13T13:00:18+00:00\",\"dateModified\":\"2025-03-11T17:02:54+00:00\",\"description\":\"Datanet Systems event: Threat Hunting with Cisco Security suite!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Eveniment-Cisco.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Eveniment-Cisco.jpg\",\"width\":2048,\"height\":1169},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/threat-hunting-cu-cisco-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOUT\u0102\u021aI \u0218I EVENIMENTE\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0218tiri \u0219i nout\u0103\u021bi\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/stiri-si-noutati\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Datanet event: Threat Hunting with Cisco Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\",\"name\":\"Vasile Gabriel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"caption\":\"Vasile Gabriel\"},\"sameAs\":[\"https:\\\/\\\/datanets.ro\"],\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/gabrielv\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Datanet event: Threat Hunting with Cisco Security","description":"Datanet Systems event: Threat Hunting with Cisco Security suite!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/","og_locale":"en_US","og_type":"article","og_title":"Datanet Systems event: Threat Hunting with Cisco Security suite!","og_description":"Datanet Systems event: Threat Hunting with Cisco Security suite!","og_url":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2023-02-13T13:00:18+00:00","article_modified_time":"2025-03-11T17:02:54+00:00","og_image":[{"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco-2-1024x575.jpg","type":"","width":"","height":""}],"author":"Vasile Gabriel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vasile Gabriel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/"},"author":{"name":"Vasile Gabriel","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b"},"headline":"Datanet event: Threat Hunting with Cisco Security","datePublished":"2023-02-13T13:00:18+00:00","dateModified":"2025-03-11T17:02:54+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/"},"wordCount":844,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco.jpg","keywords":["Automation","Cisco Secure Endpoint","Cisco Umbrella","Cisco XDR","Cybersecurity","Efficiency","Hybrid cloud","IT Security Architecture"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/","url":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/","name":"Datanet event: Threat Hunting with Cisco Security","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco.jpg","datePublished":"2023-02-13T13:00:18+00:00","dateModified":"2025-03-11T17:02:54+00:00","description":"Datanet Systems event: Threat Hunting with Cisco Security suite!","breadcrumb":{"@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2023\/02\/Eveniment-Cisco.jpg","width":2048,"height":1169},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/threat-hunting-cu-cisco-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NOUT\u0102\u021aI \u0218I EVENIMENTE","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/"},{"@type":"ListItem","position":3,"name":"\u0218tiri \u0219i nout\u0103\u021bi","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/stiri-si-noutati\/"},{"@type":"ListItem","position":4,"name":"Datanet event: Threat Hunting with Cisco Security"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b","name":"Vasile Gabriel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","caption":"Vasile Gabriel"},"sameAs":["https:\/\/datanets.ro"],"url":"https:\/\/datanets.ro\/en\/author\/gabrielv\/"}]}},"modified_by":null,"_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=23893"}],"version-history":[{"count":1,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23893\/revisions"}],"predecessor-version":[{"id":27674,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23893\/revisions\/27674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/23883"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=23893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=23893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=23893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}