Today’s threat landscape calls for a more proactive approach to security, with regular vulnerability scanning and penetration testing of IT infrastructure as well as threat hunting by the security team or your security service provider. How do you set up a vuln scanning and pen testing regimen? What’s the best way to begin and conduct threat hunting? How do you apply the results of these practices to tighten up your defenses? Listen in as threat hunting specialists share intel on how to practice proactive security using these processes as well as emerging technologies that support them.


Kev Breen

Director Cyber Threat Research, Immersive Labs

Sam Beaumont

Principal Security Consultant, IOActive

Vidya Tambe

Senior Detection and Response Analyst, Rapid7

Dan Murphy

Distinguished Architect, Invicti Security