|CFP Deadline||May 5, 2019, 11:37 p.m.|
The 4th annual SANS Threat Hunting & Incident Response (THIR) Summit will focus on specific hunting and incident response techniques and capabilities that can be used to identify, contain, and eliminate adversaries targeting your networks.
We are pleased to invite you to the Summit, where you will have the opportunity to directly learn from and collaborate with incident response and detection experts who are uncovering and stopping the most recent, sophisticated, and dangerous attacks against organizations.
Hidden threats may already exist inside most organizations’ networks. DFIR and broader security teams can’t afford to assume that preventive security measures are impenetrable, no matter how thorough they might be. Prevention systems alone are insufficient to counter focused human adversaries with the skills and dedication to thwart most security and monitoring tools.
The key is to continually and systematically look for attacks that bypass security systems, and to catch intrusions in progress rather than after attackers have attained their objectives and inflicted worse damage to the organization. For the incident responder, this process is known as “threat hunting.” Threat hunting uses known adversary behaviors to proactively examine the existing network and endpoint evidence, with the goal of identifying new data breaches as soon as possible - ideally before extensive damage is done.
Call for Presentations
We’d like to encourage you to submit to be considered for presenting at the conference. An advisory board of experts from across industry will review all submissions for selection.
The THIR Summit offers both newcomer and veteran speakers the opportunity for recognition as industry leaders. If you have something substantive and challenging to offer, we would love to hear from you.
CFP submissions should detail how the proposed case study, tool, or technique can be utilized by attendees to increase their security posture. All THIR Summit presentations will be 25 minutes of content + 5 minutes for Q&A.
We are specifically interested in presentations that focus on:
• Endpoint threat hunting
• Network threat hunting
• Hunt teams and how to organize them to be extremely effective
• Using known attacker methodologies to hunt/track adversaries
• Innovative threat hunting tools, tactics, and techniques
• Integration of threat hunting techniques to existing DFIR workflows
• Case studies on the application of threat hunting to security operations
Deadline for submission is Monday, May 5.
Questions? [email protected]