We interview Brett Wahlin, the VP of Security & Trust at Respond Software, Andrew Homer, the VP of Business Development at Morphisec, and Mat Gangwer, the Director of Managed Threat Response at Sophos.
Full Show Notes: https://wiki.securityweekly.com/ES_Episode151
Visit https://www.securityweekly.com/esw for all the latest episodes!
To learn more about our sponsors visit: The Security Weekly Sponsor’s Page
Respond Software, Morphisec, and Sophos
We interview Brett Wahlin, the VP of Security & Trust at Respond Software.
Known as the “turn around” CISO, Brett Whalin built his career fixing large-scale security programs for some of the most prominent companies in the world, including Sony, HP, and Staples. Brett joined Sony Entertainment after its high-profile PlayStation Network breach and thus started his journey to fundamentally change the way security organizations operate. During this interview, Brett will share his journey to re-imagine the security organization with an innovative SecOps program that laid the foundation for a complete transformation. Brett will share his strategic vision and the important lessons he’s learned along the way.
We interview Andrew Homer, the VP of Business Development at Morphisec.
Enterprises migrating to—or already on—Win10 have the ideal opportunity to maximize their security profile while simplifying operations, without additional cost or complexity. Leading-edge technology allows users to fully leverage the integrated Win10 security tools providing a critical prevention layer against advanced in-memory attacks, exploits, fileless attacks, zero-days and evasive malware.
We interview Mat Gangwer, the Director of Managed Threat Response at Sophos.
There are so many misconceptions about threat hunting. Misdirection and misunderstanding are lulling people into a false sense of security and leaving businesses exposed.
- Misconception #1: The most disingenuous misconception is that threat hunting can be automated.
– Truth: A machine can’t make the intelligent decision that something is good or bad. There’s a lot of things that happen in the gray area that easy for a model, machine learning or artificial intelligence to say this is good or this is bad – it takes a human to go in and understand the framework. Threat hunting requires human expertise.
- Misconception #2: By having endpoint detection and response (EDR) you’re doing threat hunting.
– Truth: EDR is an essential tool in a threat hunter’s arsenal but having only EDR gives you only part of the story.
- Misconception #3: You can add data into a SIEM and start threat hunting.
– Truth: The data is just the beginning of the hunt. One of the reasons threat hunting is unproductive is because of poor data quality. Good quality data allows you to more quickly and accurately identify complex threats.
- We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
- Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man’s talk as well!