
Old Dead Dudes and Threat Hunting by Evan Strickland
Intro: What are the goals of Cyber Security Analysis and why should we pursue it in the first place? What are the criteria for success? Where are we heading? To get you there, this talk will help you understand: Cyber Security and the Art of Argument The Discipline of Decision The Philosophy of Cyber Security…

Raleigh ISSA May 3, 2018, Meeting Pictures – RTP Headquarters
Pictures were taken by http://www.patrickkea.com/ and Raleigh ISSA Members Agenda 5:15 – 6:00 pm Career Services (Conference Room 1) 5:15 – 6:00 pm Back-to-Basics (Main Room) – Debra Ferris – The role of 3rd party Vendors and Practices in Protecting Information 6:00 – 6:45 pm Moe’s/ Drink / Socializing (Lobby) 7:00 – 7:15pm Board Updates (Main…

ExtraHop White Paper on Threat Visibility for Cyber Hunters
Abstract for ExtraHop White Paper on Threat Visibility for Cyber Hunters Multiple branches of the United States military, spearheaded by United States Cyber Command, have embraced threat hunting as a way to defend against more sophisticated adversaries. This white paper explains how Cyber Protection Teams (CPTs) can use wire data to automate detection, speed investigations,…