The Facts vs Myths of Threat Hunting
In part 2 of our myth busting webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you may have been told are the “only” ways to perform threat hunting.
Feb 28: Part 2 - Why Endpoint Detection Doesn't Equal Threat Hunting
On Wednesday, February 28th, we will look at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. We will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.
In EDR vs FSA, you will learn about:
- The use cases for traditional Endpoint Detection
- Why you shouldn’t rely on the tools that got bypassed to find hidden attackers
- How to hunt at scale and simplify the threat hunting process using FSA
The Imperia Banquet & Conference Center
1714 Easton Avenue
Somerset, NJ 08873
Thursday, March 15, 2018
Speaking Session: 3:45-415
Learn more: https://www.dataconnectors.com/event/new-jersey2018/
Elections, Threat Hunting, and More: San Antonio Cybersecurity
U.S. Rep. Will Hurd will summarize his ongoing work in Congress related to cybersecurity, and then moderate an elite panel of cybersecurity experts, including Infocyte founder Chris Gerritz, Jungle Disk’s Bret Piatt, and Jacob Stauffer of Coherent Cyber.
Moderator: Will Hurd, U.S. Congressman; Information Technology Subcommittee
- Bret Piatt, Jungle Disk
- Jacob Stauffer, Coherent Cyber
- Chris Gerritz, Infocyte
Learn more or register: https://www.xconomy.com/san-antonio-tech-seizing-the-momentum/speakers/
Webinar 1: Log Analysis vs FSA for Threat Hunting
In this 3-part live webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you have been told about are the “only” ways to perform Threat Hunting.
The first webinar will look at Log Analysis, and show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data or experts.
In Log Analysis vs FSA, you will learn about:
- Challenges faced while performing Log Analysis
- 3 advantages of using FSA over Log Analysis
- How Infocyte HUNT automates FSA to simplify and speed the hunt process
Scaleworks and Assembla Presentation Series: VIP Cloud Security Panel
Panelists will include senior security leadership from In-Q-Tel, Rackspace, Infocyte and a special guest. The discussion will be on cloud security, GDPR, and more.
Bob Gleichauf, EVP, Global Technology - In-Q-Tel
Brannon Lacey, Vice President and GM, Applications and Platforms - Rackspace
Christopher Gerritz, Co-founder - InfoCyte
Jacek Materna, CTO - Assembla
Visit Infocyte's stand on Oct 19 at the J5 Donovan Group / USSOCOM J39x & SOFWERX, Cyber Capability Expo in Tampa, FL.
This event will showcase innovative cyber capabilities from industry and provide a forum for cyber thought leaders to present their views on the future state of cyber technologies.
For more information go to: http://www.sofwerx.org/cyberexpo/
The 2018 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security. The awards are produced in partnership with the Information Security Community on LinkedIn, tapping into the vast experience of over 370,000+ cybersecurity professionals to honor the world’s best cybersecurity products, professionals and organizations.
Vote for Infocyte HUNT: Best Threat Hunting Solution
Infocyte HUNT is nominated in the Best Threat Hunting Solution category. To show your support, vote for Infocyte HUNT today! Voting closes on January 12th.
Infocyte is partnering with Crowd Research Partners for a webinar on ‘The 3 Flaws with the Defense in Depth Security Model and How to Improve It’ on Thursday, July 20th at 2 pm ET | 1 pm CT | 11 am PT | 6pm GMT. Cybersecurity experts explore why the current defense in depth model leaves critical gaps which allow attackers to remain undetected.
Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization's systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly a better approach is needed. During this webinar, Chris Gerritz, Infocyte’s Founder and the former Chief of Defensive Counter Cyberspace Operations for the U.S. Air Force AFCERT team, will discuss:
- The Defense in Depth model from an attacker kill chain perspective
- Why defense is important, but it is not the only factor to deliver security
- Where threat hunting and post-compromise detection fit in the model
DATE & TIME: July 20 at 2 pm ET | 1 pm CT | 11 am PT | 6pm GMT
CyberDEF Dojo Day Presentation:
Threat Hunting: Because We All Get Hacked
If an attacker had a foothold in your network today, would you know it? Whether they evaded your defenses or a security analyst misinterpreted a critical alert, chances are an attacker has entrenched themselves for the long haul: collecting information, credit cards, email, or intellectual property without tripping alarms. The act of actively and purposefully searching for these persistent threats is called “Threat Hunting”.
Speaker: Chris Gerritz, Co-Founder, Infocyte
For more information visit: http://www.innotechconferences.com/sanantonio/?page_id=1292
If an attacker had a foothold in your network today, would you know it? Whether your defenses were successfully evaded or an analyst misinterpreted a critical alert, chances are the attacker has entrenched themselves for the long haul. The act of searching for these well-hidden and persistent threats is called threat hunting.
In this webcast, experienced Threat Hunters from Infocyte and SANS will discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to scalably and proactively hunt for unknown threats across an entire enterprise network. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.
Alissa Torres is a SANS analyst and certified SANS instructor specializing in advanced computer forensics and incident response (IR). She has extensive experience in information security in the government, academic and corporate environments. Alissa has served as an incident handler and as a digital forensic investigator on an internal security team. She has taught at the Defense Cyber Investigations Training Academy (DCITA), delivering IR and network basics to security professionals entering the forensics community. A GIAC Certified Forensic Analyst (GCFA), Alissa holds the GCFE, GPEN, CISSP, EnCE, CFCE, MCT and CTT+ certifications.
Chris Gerritz is a co-founder of Infocyte, a developer of endpoint threat hunting solutions focused on breach discovery and interactive network defense.
Chris is a pioneer in defensive cyberspace operations having previously established and led the U.S. Air Force's first Enterprise-scoped Hunt Team. In this roll, he led a team of 28 operators and analysts tasked with finding, tracking, and neutralizing state-sponsored threats on the Air Force's $2B, 800k node enterprise network. He personally conducted and/or oversaw 350+ adversarial hunt and rapid response missions on networks throughout the world.
Chris holds a B.S. in Electrical & Computer Engineering from Oregon State University.
BuildSec Foundry Open House
Come meet our member startups that are launching new security products into the market. Launched in 2016, Build Sec Foundry is an incubator supporting product security startups in the San Antonio market. This Open House will give industry, entrepreneurs and future customers the interact with our member startups and learn about their companies, products, and future outlook. The Open House will run from 3-5 p.m., stop by anytime to speak with and meet our founders, and enjoy some food and drink.
Learn more or signup: https://sanantoniostartupweek2017.sched.com/event/9e7D
Infocyte HUNT has been recognized as a Trust Award finalist in the Best Computer Forensic Solution category for the 2017 SC Awards. The finalists and winners for the Trust Awards are chosen by a distinguished group of leading cybersecurity professionals from the SC Media readership and selected by the SC editorial team. Category winners will be announced at the SC Awards Ceremony on February 14, 2017 at the Intercontinental San Francisco.
Infocyte will be presenting the session "Introduction to Threat Hunting" at the joint (ISC)2 Singapore Chapter and the Association of Information Security Professionals (AiSP) event in February.
The Homeland and Cyber Security Panel – New Dangerous World & The Technologies Of the Future
Moderator: Ms. Jen Bawden, CEO, Bawden Capital (SFO)
- Ms. EJ Bliner, CEO & Founder, ForecastFwd
- Mr. Jonathan Conrad, CEO, Founder and Chairman, AdmieMobile
- Mr. Christopher Gerritz, Co-Founder, Infocyte
Panel Description: What is our macro economic outlook? What potential dark clouds are on the horizon that we should be aware of ? what do our experts think about the fate of the European Union? What will happen to world markets if Italy decides to leave on Dec 4?
Cyber Talk Radio - Episode 3: Malware Hunting
On Air: October 8th, 2016 from 11:00 P.M. to Midnight
Synopsis: Chris Gerritz, CEO of Infocyte will join us to discuss malware hunting.
Learn more: https://cybertalkradio.com/
Tweet us: @cybertalkradio, @InfocyteInc, @gerritzc, and @bpiatt / Stream on iHeartRadio: Android or iOS.
Manifest is a community of cybersecurity professionals, entrepreneurs and investors with a strong interest in helping to grow and enable security startups here in Austin. We kicked off in 2016 and invite all those interested in being a part of our community to our next Happy Hour during Austin Startup Week. his time we have invited three recent founders of local startups to share their story of how they took their unique idea from concept, through funding, prototyping, product launch and to the point they are today. The session will complete with a short Q&A with all three founders.
Marcus Carey - Founder and CTO, vThreat
Chris Gerritz - Co-Founder and CEO, Infocyte
Nathan Sportsman - Founder and CEO, Praetorian
Additional information here: https://manifest.splashthat.com
October is National Cyber Security Awareness Month (NCSAM). Since its inception under leadership from the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM has grown exponentially, reaching consumers, small and medium-sized businesses, corporations, educational institutions and young people across the nation.
Learn more at: https://staysafeonline.org/ncsam/
Infocyte will participate in a panel session as well as exhibit at CyberTexas 2016.
Visit us in Booth #121
Opportunities and Challenges for Small Business in Cyber
August 24, 2016 at 3:15pm in Room 302 C
Chris Kinne, Colonel, USAF (Ret), Director of San Antonio Operations, Cyberspace Operations Consulting, Inc.
Chris Gerritz, Chief Executive Officer and Co-founder, Infocyte
Sergio Muniz, President, CYFOR Technologies LLC
Cindy McClister, CEO, DC Industries
For more information visit: https://www.fbcinc.com/e/cybertexas/agendagrid.aspx
Wednesday, August 3 • 10:45am - 11:30am
Type: Breaking Ground
Room: Florentine A
Presenter: Chris Gerritz, CEO, Infocyte
Hunting is the art of searching for badness and unauthorized activity on our own systems or network. By knowing what is normal in our networks and what is possible of adversaries, the hunter can identify malware, signs of unauthorized activity, and indicators of compromise lurking within. In this session, we will explore how to hunt for malware and compromises on windows endpoints using built-in Powershell commands and scripts. We will explore how to validate what’s running on our systems and identify some of the tell-tale signs that you’ve been pwned. The failure of automated prevention and detection coupled with a disappearing perimeter means hunting will become an increasingly important skill among defenders. The skills demonstrated will be useful on your own local system or remotely against hundreds or even thousands of systems.
For more information go to: https://www.bsideslv.org/2016/06/06/agenda/
Infocyte has been selected as one of 20 start-ups to present at the Mid-Atlantic Venture Association’s (MAVA) TechBuzz Summer 2016 event on June 16th at the UMBC Columbus Center at the Inner Harbor in Baltimore, MD. With an audience of hundreds of business leaders, innovators, experienced company-builders, corporate strategic partners, potential acquirers and active investors, the company will present their innovative approach to automating the process of malware and threat hunting with the Infocyte HUNT™ solution.
For more information go to: http://mava.org/programs/techbuzz/summer-2016/pr/