Stopping the Hack: Using Advanced Analytics to Detect and Respond to Attacks

Presented by

Christopher Camejo, Director of Product Management for Threat Intelligence at NTT Security

About this talk

Getting hacked is now a matter of “when”, not “if. As a result, the ability to detect and respond to attacks before significant damage is done has become one of the most important issues in information security. A wide variety of tools and services are available with new technologies and capabilities being introduced regularly. We will take a look at the important considerations for organizations seeking to monitor their network security via in-house resources, commercial tools, and/or managed security services. This will include important factors that will dictate the cost and effectiveness of security monitoring efforts. About the Presenter: Christopher Camejo has more than 18 years of security experience, and has been with NTT Security for over 15 years with experience in the Security Operation Center, developing and supporting a managed email security service, and implementing security solutions before moving on to start the US ethical hacking team and GRC practices. He has coordinated and conducted numerous large-scale, multi-discipline penetration tests and PCI assessments for NTT Security’s global clients. As part of NTT Security’s threat intelligence capabilities, Chris follows the latest tactics and techniques of attackers, coordinates NTT Security’s vulnerability identification and disclosure activities, and helps educate NTT Security’s clients, clients from various other NTT operating companies, and the public on how to address strategic information security risks. He has presented at RSA Conference, Infosec World, the ISSA Conference, Computerworld Expo, and at United States Secret Service Electronic Crimes Task Force meetings.

Related topics:

More from this channel

Upcoming talks (20)
On-demand talks (3501)
Subscribers (180291)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.