Presented at
Black Hat Europe 2017,
Dec. 6, 2017, 2:15 p.m.
(25 minutes).
In today’s threat landscape, modern security teams recognise that compromise is inevitable. However, that does not mean that a breach should be inevitable too.
Today’s security leaders must bring together the people, process and technology to enable threat hunting. Detect and alert strategies need to be revamped to shift from reactive forms of incident response to proactive threat hunting.
Join Rick McElroy, Security Strategist for Carbon Black, to learn how better to enable your hunt.
Key takeaways:
1. Understand the role of threat hunting in a resilient cybersecurity strategy
2. Learn how to create a culture of threat hunting and embed it within your security strategy
3. Discover how to mature your threat hunting program
4. Learn how to create an ROI for threat hunting
5. Gain practical insight into the steps to take in order to start threat hunting
Presenters:
-
Rick McElroy
- Security Strategist, Carbon Black
Rick McElroy, security strategist for Carbon Black, has more than 17 years of information security experience educating and advising organisations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense, and in several industries including retail, insurance, entertainment, cloud computing, and higher education.
McElroy’s experience ranges from performing penetration testing to building and leading security programs. He is a Certified Information Systems Security Professional (CISSP), a Certified Information Security Manager (CSIM), and Certified in Risk and Information Systems Control (CRISC). As a United States Marine, McElroy’s work included physical security and counterterrorism services.
A fierce advocate for privacy and security who believes education and innovation are the keys to improving the security landscape, McElroy is program chair for the Securing Our eCity Foundation’s annual CyberFest, a San Diego event dedicated to educating public and private sector security and IT professionals and business executives on the realities of security.
Links:
Similar Presentations: