The Private Infrastructure Security Renaissance
Although it seems counterintuitive and a throwback to Enterprise IT setups from nearly a decade ago, private infrastructure is in a Renaissance period...

Cybereason Team
When an organization is under attack, every second counts. Adversaries continue to evolve their attack tactics, techniques and procedures, which means that defenses and response actions must evolve as well. Cybereason and IBM bring together industry leading tools and expertise that have done just that.
Wednesday April 27th
11:00 AM ET / 8:00 AM PT
Join Cybereason Senior Director of Incident Response Engineering Jim Hung, and IBM’s Head of Research for X-Force John Dwyer, as they discuss the current state of Incident Response (IR).
Jim and John will explain how a combination of IBM X-Force expertise paired with cutting edge Cybereason security tools and DFIR capabilities will deliver a faster, more efficient approach to IR. Cybereason, with the help of IBM, demonstrates how our new tooling is changing the DFIR and Incident Response landscape to reverse the adversarial advantage.
Cybereason is dedicated to partnering with Defenders to end attacks at the endpoint, in the cloud and across the entire enterprise ecosystem. Only the AI-driven Cybereason XDR Platform provides predictive prevention, detection and response that is undefeated against modern ransomware and advanced attack techniques. The Cybereason MalOp™ instantly delivers context-rich attack intelligence across every affected device, user and system with unparalleled speed and accuracy. Cybereason turns threat data into actionable decisions at the speed of business.
All Posts by Cybereason Team
Jim Hung has over 12 years experience in Digital Forensics and Incident Response, including primary involvement and testimony in a number of high profile cases, and is a resourceful and practical problem solver responsible for numerous engagement-defining bespoke analytical solutions. These include the development of robust and verifiable analysis methodologies using scripting, databases, and reverse engineering. A proactive and capable team-leader able to manage both on-site response and lab-based analysis teams, Jim is a subject-matter expert in a number of fields, including Mobile Device Forensics and Web Application Analysis.
John is the head of research for the IBM Security X-Force where he focuses on understanding adversary operations, developing threat detection methodologies, and advancing X-Force service offerings. In recent years, John has focused his efforts on researching ransomware adversary operations and developing adversary simulation data to help drive improvements in the areas of incident response and threat hunting. Prior to joining X-Force John was a defensive cyber operations researcher helping the U.S. Army and U.S. Air Force improve incident response operations. John has spoken at multiple events including the SANS Threat Hunting Summits, ISC2 Security Congress, and Fulbright Commission Cybersecurity Exchange on threat hunting and ransomware operations.
Although it seems counterintuitive and a throwback to Enterprise IT setups from nearly a decade ago, private infrastructure is in a Renaissance period...
Cybereason has announced the availability of Cybereason DFIR, a solution designed to automate incident response (IR) investigations by incorporating nuanced forensics artifacts into threat hunting, reducing remediation time by enabling security analysts to contain cyberattacks in minutes...
Although it seems counterintuitive and a throwback to Enterprise IT setups from nearly a decade ago, private infrastructure is in a Renaissance period...
Cybereason has announced the availability of Cybereason DFIR, a solution designed to automate incident response (IR) investigations by incorporating nuanced forensics artifacts into threat hunting, reducing remediation time by enabling security analysts to contain cyberattacks in minutes...
Get the latest research, expert insights, and security industry news.
Subscribe