Becoming a Threat Hunter in Your Enterprise

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach -- sinking hands into threat intelligence feeds, digging into behavioral analytics reports and following clues to a would-be attacker before they can do significant damage to critical data.
How do these enterprises build threat hunting programs? How do they staff them, and what tools and data do they need?

Available:
On Demand
Duration:
1h 00min

In this webinar, you’ll learn:

  • New data tools and techniques for tracking down and identifying threats to your organization
  • How to select the right tools in order to maximize the threat hunting power of your team – from small organizations to large enterprises
  • How to build an efficient threat hunting program into your security team, even when you have too much threat intel and too few staff

Featured Speakers

  • Sara Peters
    Sara Peters
    Contributing Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

  • John H. Sawyer
    John H. Sawyer
    Associate Director of Services
    IOActive, Inc.

    John H. Sawyer is the red team lead and specializes in targeted attacks, social engineering, and post-exploitation. After more than 15 years in IT security experience, he’s a member of DEF CON 14’s and 15’s CTF winners (1@stplace), co-founder the University of Florida Student Infosec Team, and founder of SwampSec. John is a respected author and trainer for organizations including Dark Reading and InformationWeek Magazine, Interop, BruCON, OWASP AppSec DC, SANS, and B-Sides Jacksonville.

  • John McArthur
    John McArthur
    Senior Product Manager
    Neustar

    John McArthur joined Neustar in November 2014 and has over 15 years of experience serving businesses and end users in the digital space. He is responsible for the product strategy and roadmap delivery of Neustar’s IP Intelligence product line, which includes IP GeoPoint and IP Reputation. John joined Neustar from JP Morgan Chase where he drove digital banking solutions for the consumer bank. Previously he served in project management, operations, and business process management roles at Chase and Accenture. He graduated from the University of California at Berkeley with a B.A. in Economics.

Sponsored By