Welcome!

News Feed Item

Stop Worrying, You're Already Hacked: Threat Hunting Experts Show How to Spot Network Attackers Faster to Limit the Damage

Delta Risk and Infocyte Team Up to Host April 25 Webinar on Findings from Threat Hunting and Compromise Assessments

SAN ANTONIO, April 17, 2018 /PRNewswire/ -- Malicious hackers and cyber criminals are always refining their techniques to avoid security tools and controls. As a result, they can evade detection on networks and websites for months or even years, potentially causing millions of dollars in financial and reputational damage. To help IT and information security professionals better understand and address this challenge, Delta Risk, a global provider of cyber security and security consulting services, announced today that it is hosting a webinar on this topic on April 25 with Infocyte, a leader in the threat hunting market. 

Chris Gerritz, one of the featured presenters for the April 25 Delta Risk webinar, is founder and Chief Product Officer, Infocyte, Inc. Chris is a retired Air Force officer and service-disabled veteran who is a pioneer in defensive cyberspace operations, having established and led the U.S. Air Force's first enterprise-scoped hunt team. Infocyte is the result of Chris’ experience hunting adversaries within some of the largest and most targeted defense networks in the world.

Andrew Cook, Manager of Delta Risk's ActiveResponse service, will be joined by Chris Gerritz, founder and Chief Product Officer of Infocyte, for "Threat Hunting Versus Compromise Assessments: What's the Difference?"

In the presentation, Cook and Gerritz will examine why organizations must take a proactive approach to looking for attackers on their networks and how this can mitigate potential damage. Although threat hunting and compromise assessments are terms that are often used interchangeably to describe this activity, the webinar will outline some of the distinct differences between them. Cook and Gerritz will also discuss:

  • How to get buy-in from the C-Level or executive team for assessments
  • What's changed with the move to cloud applications and services
  • Common mistakes and misconceptions about proactive engagements
  • Consequences for delaying hunting and assessments 

"Many organizations don't have the skills and in-house resources they need to proactively look for signs of compromise in a structured fashion," said Cook, "so they can miss key attack indicators, or they may not think to look in ways or places that a third party will. Proactively looking for attackers allows you to go beyond what you may be able to see otherwise and find evidence of intrusions that were missed."

"Delta Risk's consulting expertise, armed with our agentless Infocyte HUNT™ Platform, greatly simplifies the process of collecting and triaging data to uncover hidden threats," said Chris Gerritz, Founder and Chief Product Officer, Infocyte, Inc. "Our combined capabilities are helping organizations better protect their networks and reduce the risks associated with a security breach."

According to researcher's findings in the 2017 Threat Hunting & Detection Report, published by Crowd Research Partners, 62 percent of security and IT professionals indicated that one of their top challenges was detecting advanced threats, including hidden, unknown, and emerging threats.

About the Speakers
Andrew Cook is the Manager of Delta Risk's ActiveResponse service. Drawing from his Air Force background, he is one of the firm's leading subject matter experts in cyber threat hunting and incident response. With more than six years of experience in cybersecurity operations, research, and development, Andrew is adept at managing technical teams and skilled in host forensics, network security analysis, malware reverse engineering and enterprise security assessment. Prior to joining Delta Risk, he was an active duty Air Force Officer and spearheaded cybersecurity teams which discovered and countered advanced persistent threats to critical national assets. He earned a Master of Science in Information Security and Assurance from Western Governors University and a Bachelor of Science in Computer & Systems Engineering from Rensselaer Polytechnic Institute.

Chris Gerritz, founder and Chief Product Officer, Infocyte, Inc. is a retired Air Force officer and service-disabled veteran who is a pioneer in defensive cyberspace operations, having established and led the U.S. Air Force's first enterprise-scoped hunt team. Infocyte is the result of Chris' experience hunting adversaries within some of the largest and most targeted defense networks in the world. Prior to co-founding Infocyte, Chris served as the Air Force Computer Emergency Response Team (AFCERT)'s first Chief of DCC Operations. In this role, he personally conducted and/or oversaw 350+ adversarial hunt, rapid response and threat engagement missions on networks throughout the world. Chris holds a B.S. in Electrical & Computer Engineering from Oregon State University.

About Delta Risk 
Delta Risk LLC, a Chertoff Group company, provides customized and flexible cyber security and risk management services to government and private sector clients worldwide. Founded in 2007, we are a U.S.-based firm offering a wide range of advisory services as well as managed security services. Our roots are based in military expertise, and that background continues to drive our mission focus. We are passionate about keeping our clients safe and secure. For more information, visit https://www.deltarisk.com.

About Infocyte, Inc.
Headquartered in Austin, TX, Infocyte, Inc. was developed by former US Air Force cybersecurity officers, Infocyte's dedicated forensics-based threat hunting platform discovers the post-compromise activity of cyber attackers and malware that have bypassed other defenses. The company's unique approach to security reduces attacker dwell time to help organizations and independent assessors defend networks and critical information. Infocyte HUNT was honored with a Silver Cybersecurity Product Award for the Best Threat Hunting Tool by 2018 Cybersecurity Excellence Awards. For more information, visit https://www.infocyte.com.

 

Andrew Cook is the Manager of Delta Risk's ActiveResponse service. Drawing from his Air Force background, he is one of the firm's leading subject matter experts in cyber threat hunting and incident response. With more than six years of experience in cybersecurity operations, research, and development, Andrew is adept at managing technical teams and skilled in host forensics, network security analysis, malware reverse engineering and enterprise security assessment. Prior to joining Delta Risk, he was an active duty Air Force Officer and spearheaded cybersecurity teams which discovered and countered advanced persistent threats to critical national assets. He earned a Master of Science in Information Security and Assurance from Western Governors University and a Bachelor of Science in Computer & Systems Engineering from Rensselaer Polytechnic Institute.

Delta Risk , a Chertoff Group company, provides customized and flexible cyber security and risk management services to government and private sector clients worldwide. Founded in 2007, we are a U.S.-based firm offering a wide range of advisory services as well as managed security services. Our roots are based in military expertise, and that background continues to drive our mission focus. We are passionate about keeping our clients safe and secure.

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/stop-worrying-youre-already-hacked-threat-hunting-experts-show-how-to-spot-network-attackers-faster-to-limit-the-damage-300630954.html

SOURCE Delta Risk

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...