This is a great presentation describing the approach for cyber threat hunting and discussing the various techniques employed, the advantages, disadvantages and key considerations for its use in identifying advanced threats, and leveraging endpoint detection and response (EDR) toolsets. For detection, response and remediation - what capabilities to prioritize in order to enable your threat hunting team effectively. Please pass along as you see fit!