When an organisation is under attack, every second counts. Adversaries continue to evolve their attack tactics, techniques and procedures, which means that defenses and response actions must evolve as well.
Cybereason and IBM bring together industry leading tools and expertise that have done just that.
Join Cybereason’s Jim Hung and IBM’s Head of Research for X-Force John Dwyer, as they discuss the current state of Incident Response (IR), and demonstrate how a combination of IBM X-Force’s expertise paired with Cybereason’s cutting edge security tools and DFIR capabilities deliver a faster more efficient approach to IR. Cybereason, with the help of IBM, demonstrates how our new tooling is changing the DFIR and Incident Response landscape to reverse the adversarial advantage.
Jim Hung has over 12 years experience in Digital Forensics and Incident Response, including primary involvement and testimony in a number of high profile cases, and is a resourceful and practical problem solver responsible for numerous engagement-defining bespoke analytical solutions. These include the development of robust and verifiable analysis methodologies using scripting, databases, and reverse engineering. A proactive and capable team-leader able to manage both on-site response and lab-based analysis teams, Jim is a subject-matter expert in a number of fields, including Mobile Device Forensics and Web Application Analysis.
John is the head of research for the IBM Security X-Force where he focuses on understanding adversary operations, developing threat detection methodologies, and advancing X-Force service offerings. In the recent years, John has focused his efforts on researching ransomware adversary operations and developing adversary simulation data to help drive improvements in the areas of incident response and threat hunting. Prior to joining X-Force John was a defensive cyber operations researcher helping the U.S. Army and U.S. Air Force improve incident response operations. John has spoken at multiple events including the SANS Threat Hunting Summits, ISC2 Security Congress, and Fulbright Commission Cybersecurity Exchange on threat hunting and ransomware operations.