Hi [[ session.user.profile.firstName ]]

Proactive Security: Building A Successful Threat Hunting Program

Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.
Recorded Nov 10 2016 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Carl Manion, Managing Principal @ Raytheon Foreground Security
Presentation preview: Proactive Security: Building A Successful Threat Hunting Program

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Exposing Threats You Don't Even Know About Recorded: Nov 16 2017 38 mins
    Ross Mathews, V-SOC Operations Manager & Rebekah Wilke, Director Managed Detection & Response, cyber services, Raytheon
    Raytheon cyber services experts will discuss how our Threat Scope Engagement can help organizations of all sizes and complexity mature their cybersecurity posture and operations.

    This session will cover:

    * How we can provide recommendations to enhance prevention, visibility detection capabilities and incident response

    * How to develop custom content to enable more efficient detection of threats and attacks

    * Creating a roadmap to ensure a deep understanding of your network environment and most critical risks to your organization.
  • Ransomware: Prevention is the Best Medicine Recorded: Sep 26 2017 33 mins
    Mark Bartlett, Manager, Research & Development - Cyber Services, Raytheon
    As the threat landscape continues to evolve, the techniques used by cyber criminals become more sophisticated causing more and more attacks to slip through the cracks. Figuring out how ransomware makes its way into your organization is key to preventing these attacks before they occur.

    Join us for a live webinar where we'll discuss how a combination of services and training can help quickly and easily detect digital threat incidents.

    This session will cover:
    * How to detect, investigate and respond to ransomware
    * How to verify the infection and how it happened in order to minimize future risks
    * Utilizing SOC automation tools to save time, money and resources
    * How to use existing tools to hunt for advanced and out of the ordinary patterns or traffic within your environment
  • Be Ready or Pay the Price: Defending Against the Next Ransomware Attack Recorded: Aug 24 2017 40 mins
    Mark Orlando, Chief Technology Officer, Raytheon Cyber
    Despite 2017 only being halfway over, there is a long list of significant breaches impacting organizational reputation and bottom line across a variety of industries. The WannaCry and NotPetya outbreaks exploited computer security vulnerabilities and disrupted businesses in more than 150 countries on their way to a worldwide cost estimated at more than $4 billion.

    Join us Thursday, August 24, 2017 at 2:00p EDT for our free webinar to learn more about:

    1. How to prioritize fundamentals of network defense while working towards advanced capabilities
    2. Visibility and why it’s so important in defending your enterprise
    3. How to use threat intelligence and automation as an enabler, not a crutch
  • Key Threats To Look Out for in 2017 Recorded: Dec 13 2016 60 mins
    Josh Douglas, Chief Strategy Officer, Raytheon Foreground Security; Stuart Taylor, Senior Director, Forcepoint Labs
    To close out 2016, we'll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We'll then use that information to assess the key threats that'll be on the horizon in 2017 and what you can do to protect your organization.
  • Proactive Security: Building A Successful Threat Hunting Program Recorded: Nov 10 2016 43 mins
    Carl Manion, Managing Principal @ Raytheon Foreground Security
    Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.
Every side of cyber
Briefs with Raytheon thought leaders and our partners that cross the spectrum of cyber topics including cyber as a service, cyber systems integration, cyber analytics, cyber automation and orchestration, and cyber resiliency.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Proactive Security: Building A Successful Threat Hunting Program
  • Live at: Nov 10 2016 7:00 pm
  • Presented by: Carl Manion, Managing Principal @ Raytheon Foreground Security
  • From:
Your email has been sent.
or close