Proactive Security: Building A Successful Threat Hunting Program
Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.
RecordedNov 10 201643 mins
Your place is confirmed, we'll send you email reminders
Ross Mathews, V-SOC Operations Manager & Rebekah Wilke, Director Managed Detection & Response, cyber services, Raytheon
Raytheon cyber services experts will discuss how our Threat Scope Engagement can help organizations of all sizes and complexity mature their cybersecurity posture and operations.
This session will cover:
* How we can provide recommendations to enhance prevention, visibility detection capabilities and incident response
* How to develop custom content to enable more efficient detection of threats and attacks
* Creating a roadmap to ensure a deep understanding of your network environment and most critical risks to your organization.
Mark Bartlett, Manager, Research & Development - Cyber Services, Raytheon
As the threat landscape continues to evolve, the techniques used by cyber criminals become more sophisticated causing more and more attacks to slip through the cracks. Figuring out how ransomware makes its way into your organization is key to preventing these attacks before they occur.
Join us for a live webinar where we'll discuss how a combination of services and training can help quickly and easily detect digital threat incidents.
This session will cover:
* How to detect, investigate and respond to ransomware
* How to verify the infection and how it happened in order to minimize future risks
* Utilizing SOC automation tools to save time, money and resources
* How to use existing tools to hunt for advanced and out of the ordinary patterns or traffic within your environment
Mark Orlando, Chief Technology Officer, Raytheon Cyber
Despite 2017 only being halfway over, there is a long list of significant breaches impacting organizational reputation and bottom line across a variety of industries. The WannaCry and NotPetya outbreaks exploited computer security vulnerabilities and disrupted businesses in more than 150 countries on their way to a worldwide cost estimated at more than $4 billion.
Join us Thursday, August 24, 2017 at 2:00p EDT for our free webinar to learn more about:
1. How to prioritize fundamentals of network defense while working towards advanced capabilities
2. Visibility and why it’s so important in defending your enterprise
3. How to use threat intelligence and automation as an enabler, not a crutch
To close out 2016, we'll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We'll then use that information to assess the key threats that'll be on the horizon in 2017 and what you can do to protect your organization.
Carl Manion, Managing Principal @ Raytheon Foreground Security
Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.
Briefs with Raytheon thought leaders and our partners that cross the spectrum of cyber topics including cyber as a service, cyber systems integration, cyber analytics, cyber automation and orchestration, and cyber resiliency.
Proactive Security: Building A Successful Threat Hunting ProgramCarl Manion, Managing Principal @ Raytheon Foreground Security[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]43 mins