Threat Hunting to Catch Adversaries, Not Just Stop Attacks | Threatpost

We need to evolve threat hunting into a pursuit of adversaries.

The threat hunting practice has helped security teams detect and reduce dwell time of breaches, but most hunting expeditions focus on threats — leaving the adversary free to launch another set of attacks with different tactics.

Join Threatpost’s upcoming webinar series for a tour of the deep and dark web, and other closed sources that can provide valuable insights into the motivations and activities of threat actors and how to track them down before they launch their next attack.

Throughout the conversation, a collection of world-class experts will help you better understand the motivation behind the actions of these actors, their social networks and how to anticipate their next steps.

The group will also answer audience questions to provide practical advice for the latest challenges facing the cybersecurity community.

Register now for “Threat Hunting to Catch Adversaries, Not Just Stop Attacks” on Wednesday, Sept. 22 at 2 PM ET.

Featured Speakers

Sumukh TendulkarSumukh Tendulkar – Senior Director of Product Marketing

Sumukh Tendulkar is the Senior Director of Product Marketing at Cybersixgill. Before joining Cybersixgill, he was the Director of Product Marketing at several companies including IBM Security, RSA, and Inflexxion. He received his bachelor’s in Electrical Engineering from the University of Mumbai and his MBA in Strategic Marketing from the Massachusetts Institute of Technology.

Edan Cohen – Cyber Threat Intelligence Specialist

Edan Cohen is a Cyber Threat Intelligence Specialist at Cybersixgill. Previously, he worked in Corporate Security at the World Bank Group and has experience working at several security consulting companies both in the United States and abroad.

Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devil’s Advocate, etc.

Chris is currently serving as a vCISO or advisor for a number of entities around the globe. His most recent projects are focused within the deception, identity, cryptography, Artificial Intelligence, and services space. Over the years, he’s founded or worked with a number of folks specializing in OSINT/SIGING/HUMINT research, intelligence gathering, cryptography, and deception technologies. These days he’s working on spreading the risk, maturity, collaboration and communication word across the industry. (Likely while coding his EEG driven digital clone that’s monitoring his tea and biscuit consumption!)

Becky Bracken – Threatpost Journalist and Webinar Producer

Becky Bracken is a Threatpost journalist who produces and hosts Threatpost’s webinar series.

(Interested in learning more about how your company can get involved with Threatpost webinars? Contact [email protected] to learn more about Sponsored and Underwriting opportunities.)