Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Rise of Cyber Hunting: Not Falling Victim to Undetected Breaches

    Location:  Room 111
    Format: Conference Session
    Track: Security
    Pass Type: All Access, Conference, Thursday Conference - Get your pass now!
    Vault Recording: TBD

    The security industry is beginning to see that organizations are tired of waiting to be notified of a breach, which on average takes 205 days to detect. Less than one-third of victims discovered their breaches themselves last year, while 69 percent were notified by an external entity.

    Companies are now becoming more proactive and employing dedicated cyber hunters – tasked with finding trails of malicious activity within their environment that bypass traditional AV and intrusion detection tools. A major challenge faced by enterprises employing cyber hunters, or those looking to do so, is how to implement this capability cost effectively. Cyber hunters are uniquely skilled and bring a sixth sense at finding relevant campaigns by listening to chatter in the dark net, analyzing third-party threat intelligence, and looking inward by combing through server logs and analyzing successful and unsuccessful intrusion attempts to spot patterns – a process that is intensely manual and time consuming. They are often more expensive than standard cyber security professionals who man enterprise security operation centers.

    In this session, Kris Lovejoy will discuss the evolution of cyber hunting, its relationship to traditional cyber security operations, and the role emerging technologies can play in reducing the cost and improving the effectiveness of hunting operations. She will also cover how new trends in automation can help reduce time spent investigating a breach from months to minutes.

    Attendees will learn:
    • Steps to take for a successful cyber hunting mission - from building a baseline hunting capability to hunting across the cyber kill chain – where emerging technologies have the biggest impact – to cyber hunting's contributions to incident investigation and remediation.
    • How leveraging adaptive logging technologies, predefined automated action plans, machine learning and contextual evidence generation allows cyber hunters to codify their insights, tactics, and procedures.
    • How this combination of technologies and processes will enable enterprises to ultimately reduce their reliance on high-end specialists and allow the security architecture and traditional security operators to bare a greater portion of the hunting efforts.
    • Insights into how a next-generation SOC operates.
    • How to achieve immediate ROI by empowering the cyber hunters to achieve the goal of confronting everything coming in vs. simply reacting and trying to determine how bad it is.