Becoming a Threat Hunter in Your Enterprise

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach -- sinking hands into threat intelligence feeds, digging into behavioral analytics reports and following clues to a would-be attacker before they can do significant damage to critical data.
How do these enterprises build threat hunting programs? How do they staff them, and what tools and data do they need?

Thu, Jan 25, 2018 10:00 AM PST / 01:00 PM EST
1h 00min

In this webinar, you’ll learn:

  • New data tools and techniques for tracking down and identifying threats to your organization
  • How to select the right tools in order to maximize the threat hunting power of your team – from small organizations to large enterprises
  • How to build an efficient threat hunting program into your security team, even when you have too much threat intel and too few staff

Featured Speakers

  • Sara Peters
    Sara Peters
    Contributing Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

  • John H. Sawyer
    John H. Sawyer
    Senior Managing Consultant

    John H. Sawyer is a Senior Managing Consultant with InGuardians, where he specializes in red team assessments, social engineering, and intrusion analysis. He is member of the winning team from DEF CON 14’s and 15’s Capture the Flag competition, co-founder of the University of Florida Student Infosec Team, and founder of SwampSec. John is also a respected author and trainer for organizations including Dark Reading and InformationWeek Magazine, Interop, BruCON, OWASP AppSec DC, SANS, and B-Sides Jacksonville.

  • John McArthur
    John McArthur
    Senior Product Manager

    John McArthur joined Neustar in November 2014 and has over 15 years of experience serving businesses and end users in the digital space. He is responsible for the product strategy and roadmap delivery of Neustar’s IP Intelligence product line, which includes IP GeoPoint and IP Reputation. John joined Neustar from JP Morgan Chase where he drove digital banking solutions for the consumer bank. Previously he served in project management, operations, and business process management roles at Chase and Accenture. He graduated from the University of California at Berkeley with a B.A. in Economics.

Sponsored By