SANS Threat Hunting and Incident Response Summit 2018
 
Summit Dates: September 6 & 7, 2018
Call for Presentations Closes on Monday, March 5, 2018
  

      The Threat Hunting & Incident Response Summit will focus on specific hunting and incident response techniques and capabilities that can be used to identify, contain, and eliminate adversaries targeting your networks. SANS and our advisory partner Carbon Black are pleased to invite you to the Summit where you will have the opportunity to directly learn from and collaborate with incident response and detection experts who are uncovering and stopping the most recent, sophisticated, and dangerous attacks against organizations. 

Chances are very high that hidden threats already exist inside your organization’s networks. Organizations can’t afford to assume that their security measures are impenetrable, no matter how thorough their security precautions might be. Prevention systems alone are insufficient to counter focused human adversaries who know how to get around most security and monitoring tools.

The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress rather than after attackers have attained their objectives and done worse damage to the organization. For the incident responder, this process is known as “threat hunting.” Threat hunting uses known adversary behaviors to proactively examine the network and endpoints and identify new data breaches.

Call for Speakers - Deadline Monday, March 5 at 5 pm CST

If you are interested in presenting, SANS and our advisory partner Carbon Black would be delighted to consider your threat hunting-focused proposal with use cases and communicable lessons. We are looking for presentations from both the intelligence producer and the intelligence consumer fields, with actionable takeaways for the audience.

The THIR Summit offers speakers opportunities for exposure and recognition as industry leaders. If you have something substantive, challenging, and original to offer, you are encouraged to submit a proposal.

CFP submissions should detail how the proposed case study, tool, or technique can be utilized by attendees to increase their security posture. All THIR Summit presentations will be 30 minutes with 5 minutes for questions. 

We are looking for presentations that focus on:
• Endpoint threat hunting
• Network threat hunting
• Hunt teams and how to organize them to be extremely effective
• Using known attacker methodologies to hunt/track adversaries
• Innovative threat hunting tools, tactics, and techniques
• Case studies on the application of threat hunting to security operations




* 1. Speaker 1: Please provide your contact details.

* 2. (Optional) Speaker 2:  Please provide your contact details.

* 3. Title of Proposed Talk

* 4. Abstract: The presentation abstract should outline your presentation and what attendees will learn.

* 6. Does your company sell products or services related to Threat Hunting and Incident Response?

* 7. Have you ever given a similar talk before, if so where? Do you plan to give a similar talk anywhere else, if so where?

* 8. Biography for use in summit program guide and website (400 characters max):

* 9. Please upload your headshot to a shareable link such as a dropbox, onedrive, or google drive: Headshot with a minimum resolution of 300 dpi.  Paste link to photo below.

* 10. If you use twitter, what is your twitter handle?

* 11. What is your company's twitter handle?

* 12. Do you blog?  If so, please provide link:

* 13. Do you have any YouTube or online videos of you speaking?  If so, please provide links below.  

Page1 / 1
 
100% of survey complete.

T