Real World Threat Hunting Security threats have grown from network annoyances to attacks on sensitive infrastructure; penetrating network perimeters, moving laterally within networks, breaching new device types, and cloaking movements. This presentation will share techniques utilized by Cisco to detect and investigate sophisticated, embedded threats. The speaker, who has conducted monitoring and investigations on customer networks, will review recent real attacks observed on customer networks, from discovery to remediation, and provide lessons learned. These interactive case examples will highlight how to identify these threats using security intelligence, expert staff, and the Cisco OpenSOC platform. Examples of attacks and illustrations: * Sophisticated phishing attacks targeted at customer environments. * Breaches and data exfiltration resulting from the high-profile HeartBleed and Shellshock vulnerabilities. * Sophisticated malware targeting financial institutions with the goal of data theft. * Use of full packet capture to identify data exfiltration.