Today’s sophisticated cyber attackers have found many ways to evade traditional perimeter defenses and launch exploits that lay for months, even years, without detection. In response, many enterprises have establish threat hunting practices, hiring teams and arming them with threat hunting tools and processes that proactively seek out malware and attackers lurking in the enterprise IT environment.
But how do you build effective threat hunting practices? In this instructive webinar, experts join Dark Reading editors to offer advice and recommendations on threat hunting, and how to optimize its effectiveness for enterprise cyber defense.
Key Takeaways:
About the Speakers:
Stacey Halota, Vice President – Information Security and Privacy, Graham Holdings Company
Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance, and other data protection efforts. Halota has more than 20 years of experience in the information technology, security, and privacy field.
David Wolpoff, Co-Founder, CTO, Randori
David Wolpoff (moose) is co-founder and CTO of Randori. David is a recognized expert in digital forensics, vulnerability research and embedded electronic design. Prior to founding Randori, David held executive positions at Kyrus Tech, a leading defense contractor, and ManTech where he oversaw teams conducting vulnerability research, forensics and offensive security efforts on-behalf of government and commercial clients. David holds a Bachelor of Science and Master of Science degrees in Electrical Engineering from the University of Colorado.