Speakers‎ > ‎

Threat Hunting with ELK

This hands-on class will walk attendees through leveraging the open source ELK stack to analyze logs to proactively identify malicious activity. The basic tools and techniques taught during this class can be used to investigate isolated security incidents or implemented at scale for continuous monitoring.

Trainers: Ben Hughes, Liana Parakesyan, and Peter Quach
Ben brings over 12 years of diverse experience in cyber security, IT, and law. He leads Polito's commercial services including vulnerability assessments, penetration testing, incident response, forensics, and threat hunting. Prior to joining Polito, Ben worked on APT hunt teams at federal and commercial clients, sharpening his skills in network security monitoring, IR, forensics, malware analysis, security configuration, and cyber threat intelligence. He holds CISSP, GCFA, GWAPT, and Splunk Power User certifications. Ben is also a member of the Maryland bar and volunteers at a pro bono legal clinic.

Liana brings to Polito a wide range of experience in cybersecurity. Liana has worked with policies from various industries, created tailored cybersecurity frameworks for companies and agencies. She has background in building cybersecurity laboratories for clients and conducting penetration testing, and threat intelligence activities. She holds Security +, CEH, and CISSP certifications. Liana also leads community workshops to educate people about cybersecurity and privacy.

Peter has a diverse background in cyber security, IT, project management, marketing, and business development. He has worked on many projects over the years for Fortune 500 companies and is currently a Project Manager at Polito, Inc. Peter believes that cyber security should enable business and works with clients to create and implement solutions that work for their unique needs. Peter double majored in both Business Administration as well as Information Systems Management and currently holds the Security+ certification.