There’s no shortage of security tools on the market these days. It seems that almost weekly we’re greeted with headlines trumpeting the release of a new tool designed to help admins investigate breaches, identify dangerous threats, or curtail malware.
To that effect, almost daily, we're met with news of data breaches, hacks, and new vulnerabilities being exploited. The numbers around hacked data continue to pile up. According to a study conducted by Gemalto in April the number of data records compromised in publicly disclosed data breaches exceeded 2.5 billion last year, a figure that's 88 percent higher than the year prior. This is on top of a time when breaches come at a steep cost. IBM, just this month, said the average cost of a data breach globally last year was $3.86 million, a 6.4 percent jump from the year prior.
Today's threats are constantly pitting cybersecurity teams against the odds, in a race against time, to mitigate risk before the damage can be done. As we've seen time and time again however, there is no single, magic bullet when it comes to threat detection.
If you're headed to Black Hat next month you'll be met with a slew of informative sessions to choose from. Consider carving out 50 minutes of your day on Wednesday to catch Tim Bandos, our Vice President, Cybersecurity, walk you through some the latest threat hunting techniques admins can use to ferret out malicious insiders and external threats on your network.
In his session, Big Game Threat Hunting: Become an Expert Marksman, Tim will describe how threat hunters can use new techniques like behavioral analytics, forensics, and open source tools to their advantage. The session should give both new and advanced threat hunters insight derived from Tim and his security team's years of experience.
The session will also offer:
- Advanced threat hunting tactics, techniques and procedures
- Incorporating behavioral analytics into your regular Threat Hunting activities
- New ways to incorporate forensic analysis into your security program
- How to leverage attributes & metadata of system-related activity to hunt for anomalous behavior
- Take advantage of open-source tools for maximizing threat hunting engagements
Add Tim's talk - Wednesday, August 8th, from 4:10-5 p.m, in Business Hall Theater B - to your Black Hat schedule today!
Black Hat 2017 image courtesy of Black Hat