Building and Refining Threat Hunting Practices in Your Enterprise

Today’s sophisticated cyber attackers have found many ways to evade traditional perimeter defenses and launch exploits that lay for months, even years, without detection. In response, many enterprises have launched threat hunting tools and processes that proactively seek out malware and attackers lurking in the enterprise IT environment. What’s the best way to make threat hunting work in your organization? In this instructive webinar, experts join Dark Reading editors to offer advice and recommendations on threat hunting, and how to optimize its effectiveness in enterprise cyber defense.

Available:
Wed, Aug 19, 2020 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn the latest tools and strategies for making threat hunting most effective
  • Examine how your overtaxed security team can find time for threat hunting when there are all those alerts to sift through
  • See how to integrate threat hunting into other active defense practices, like penetration testing and red teaming

Featured Speakers

  • Stacey Halota
    Stacey Halota
    Vice President-Information Security and Privacy
    Graham Holdings Company

    Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. Graham Holdings is a diversified education and media company whose operations include educational services, television broadcasting, online, print and local TV news, home health and hospice care, manufacturing, car dealerships and restaurants. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance and other data protection efforts. Stacey has more than 25 years of experience in the information technology, security and privacy field. Before joining Graham Holdings, she served as the federal government and southeast region leader of Guardent (now part of Verisign), a security and privacy consulting and managed security services company. Prior to Guardent, she worked at PricewaterhouseCoopers in the Technology Risk Services consulting practice working with federal government and Fortune 500 clients. Stacey is a past recipient of Secure Computing Magazine’s Chief Security Officer of the Year award and was also named Mid-Atlantic Information Security Executive of the Year (Commercial Category) by the Executive Alliance. She is a Certified Information Systems Security Professional (CISSP), a Certified Information Privacy Professional (CIPP) and a Certified Information Systems Auditor (CISA). Stacey is a frequent speaker on information security and privacy topics and is on the strategic advisory boards of CyberVista and Y/L Ventures.

  • David Wolpoff
    David Wolpoff
    Co-Founder, CTO
    Randori

    David Wolpoff (Moose) is co-founder and CTO of Randori. David is a recognized expert in digital forensics, vulnerability research and embedded electronic design. Prior to founding Randori, David held executive positions at Kyrus Tech, a leading defense contractor, and ManTech where he oversaw teams conducting vulnerability research, forensics and offensive security efforts on-behalf of government and commercial clients. David holds a Bachelor of Science and Master of Science degrees in Electrical Engineering from the University of Colorado.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By