Hi [[ session.user.profile.firstName ]]

Modernizing Your SOC: A CISO-led Training

Modern SOCs looks very different than those that were built even a few years ago. This webinar discusses the fundamental shifts in thinking and technology that allow security teams to spend more time seeking out and detecting advanced attacks. You'll learn:

• Key characteristics of high-performing security programs
• How to react faster and more efficiently to new, advanced threats
• Necessary skills for hunt teams and how to measure their performance
•The effectiveness of threat hunting in reducing the dwell time of adversaries
Recorded Apr 21 2017 66 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Edward Amoroso, CEO of TAG Cyber, former CISO at AT&T
Presentation preview: Modernizing Your SOC: A CISO-led Training

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hunter Spotlight: Interview with Danny Akacki, Fortune 100 Hunter Recorded: Jun 22 2017 33 mins
    Danny Akacki, Threat Hunter, Fortune 100 Company
    Danny Akacki works on the Hunt Team for a Fortune 100 Finance Company. In this interview, Danny will share his experiences hunting and discuss:

    1. What makes a good hunter?
    2. What makes a good hunt program?
    3. How mature does an org need to be in order to benefit from a hunting program?
    4. Why should you avoid hunting before your org is ready?
    5.What's the difference between an investigation and a hunt?
  • Hunting From Network to Endpoint (Hunter Spotlight) Recorded: May 25 2017 31 mins
    Ryan Nolette, Hunter and security technologist at Sqrrl
    Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
    • Determining what endpoints to investigate in a hunt
    • Pivoting from network to endpoint investigations
    • Essential tools and best practices for endpoint hunting

    About the hunter:
    Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
  • Conducive Environments for Successful Threat Hunting (Hunter Spotlight) Recorded: May 24 2017 32 mins
    Jason Smith, Security Operations Investigator Manager at Cisco
    Veteran threat hunter Jason Smith will detail:
    • How to structure your Security Operations Center (SOC) and network to help uncover hidden threats
    • Best practices to make hunting data accessible and fluid
    • Essential tools and tips from Jason's hunting experiences

    About the hunter:
    Jason Smith has a background in physics and has built everything from particle
    accelerators to explosive neutralizing robots used by the military. He has worked in multiple US Department of Defense SOCs and has worked with the largest security vendors to operationalize security in the world's largest
    organizations. Jason co-wrote Applied Network Security Monitoring and maintains the open source project FlowBAT, a graphical flow data analysis tool. Jason currently works remotely for Cisco from his home in Nashville, TN.
  • Leading and Building Threat Hunting Teams (Hunter Spotlight) Recorded: May 23 2017 33 mins
    Alan Orlikoski, Security Engineer at Square Inc.
    Our Hunter Spotlight series kicks off with Alan Orlikoski. From his 16+ years of security experience, Alan will share:
    • Organizational strategies that work for both hunters and SOC managers
    • How to create and sustain effective hunting teams
    • Best practices and tools in the field

    About the hunter:
    Alan Orlikoski is a Security Engineer and Incident Responder with over 17 years of experience. He analyzes and tests existing incident response plans, conducts forensic investigations and provides incident response and forensics training. Alan has an extensive computer forensics background and has been a leader in some of the largest incident response and security operations center development programs in the history of the respective companies.
  • Modernizing Your SOC: A CISO-led Training Recorded: Apr 21 2017 66 mins
    Edward Amoroso, CEO of TAG Cyber, former CISO at AT&T
    Modern SOCs looks very different than those that were built even a few years ago. This webinar discusses the fundamental shifts in thinking and technology that allow security teams to spend more time seeking out and detecting advanced attacks. You'll learn:

    • Key characteristics of high-performing security programs
    • How to react faster and more efficiently to new, advanced threats
    • Necessary skills for hunt teams and how to measure their performance
    •The effectiveness of threat hunting in reducing the dwell time of adversaries
  • Threat Hunting for Command and Control Activity Recorded: Mar 16 2017 63 mins
    Josh Liburdi, Threat Hunter and Security Technologist at Sqrrl
    Sqrrl's Security Technologist Josh Liburdi provides an overview of how Sqrrl is used to detect C2 through a combination of automated detection and hunting. You'll learn:

    • How hunting can fill gaps not covered by automated alerts
    • The Hunting Maturity Model and how Sqrrl's capabilities align with it
    • Sqrrl's machine learning TTP detectors use in detecting C2, including Domain Generation Algorithms and DNS tunneling
    • Walkthroughs of detecting C2 with common hunting techniques, including IOC searching and data stacking
  • Leveraging DNS to Surface Attacker Activity Recorded: Mar 2 2017 63 mins
    Chris McCubbin, Director of Data Science at Sqrrl, and Josh Liburdi, Security Technologist at Sqrrl
    Watch this training to learn how to uncover advanced threats using DNS and data science. You'll learn:

    • What DNS is and how adversaries can utilize it to carry out attacks
    • How to use DNS data to launch an incident investigation
    • How to leverage data science techniques to detect DNS behaviors like DGA
    • The practical fundamentals of how these data science techniques work
Target. Hunt. Disrupt advanced cyber threats.
Sqrrl is the threat hunting company that enables organizations to target, hunt, and disrupt advanced cyber threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Modernizing Your SOC: A CISO-led Training
  • Live at: Apr 21 2017 10:55 pm
  • Presented by: Edward Amoroso, CEO of TAG Cyber, former CISO at AT&T
  • From:
Your email has been sent.
or close