Webinar April 27th: Solving the Incident Response Data Problem

When an organization is under attack, every second counts. Adversaries continue to evolve their attack tactics, techniques and procedures, which means that defenses and response actions must evolve as well.  Cybereason and IBM bring together industry leading tools and expertise that have done just that.

Wednesday April 27th

11:00 AM ET / 8:00 AM PT

REGISTER HERE

Join Cybereason Senior Director of Incident Response Engineering  Jim Hung, and IBM’s Head of Research for X-Force John Dwyer, as they discuss the current state of Incident Response (IR).

Jim and John will explain how a combination of IBM X-Force expertise paired with cutting edge Cybereason security tools and DFIR capabilities will deliver a faster, more efficient approach to IR. Cybereason, with the help of IBM, demonstrates how our new tooling is changing the DFIR and Incident Response landscape to reverse the adversarial advantage.

Speakers

Jim-Hung-circle

Jim Hung

SENIOR DIRECTOR, INCIDENT RESPONSE ENGINEERING

Jim Hung has over 12 years experience in Digital Forensics and Incident Response, including primary involvement and testimony in a number of high profile cases, and is a resourceful and practical problem solver responsible for numerous engagement-defining bespoke analytical solutions. These include the development of robust and verifiable analysis methodologies using scripting, databases, and reverse engineering. A proactive and capable team-leader able to manage both on-site response and lab-based analysis teams, Jim is a subject-matter expert in a number of fields, including Mobile Device Forensics and Web Application Analysis.

John-Dwyer-circle

JOHN DWYER

HEAD OF RESEARCH, IBM SECURITY X-FORCE

John is the head of research for the IBM Security X-Force where he focuses on understanding adversary operations, developing threat detection methodologies, and advancing X-Force service offerings. In recent years, John has focused his efforts on researching ransomware adversary operations and developing adversary simulation data to help drive improvements in the areas of incident response and threat hunting. Prior to joining X-Force John was a defensive cyber operations researcher helping the U.S. Army and U.S. Air Force improve incident response operations. John has spoken at multiple events including the SANS Threat Hunting Summits, ISC2 Security Congress, and Fulbright Commission Cybersecurity Exchange on threat hunting and ransomware operations.