Avatar

Matt Valites

Information Security Investigator

Computer Security Incident Response Team (CSIRT)

Matthew Valites is a senior investigator on the Computer Security Incident Response Team (CSIRT). He specializes in building actionable high-fidelity detection techniques for network or system attacks and compromises, with a focus on targeted and high-value assets. Joining Cisco via the WebEx acquisition, he brings in-depth expertise building an Incident Response program for cloud and hosted service enterprises.

Matt's recent responsibilities include security investigations, mining security-centric alerts from large data sets, and mobile data forensics.

Articles

February 7, 2017

SECURITY

Cisco Hosting Amsterdam 2017 FIRST Technical Colloquium

We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2017. The main event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 25th and 26th of April 2017. We are also offering an optional, free…

February 3, 2016

SECURITY

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016. The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registr…

October 18, 2013

SECURITY

Getting a Handle on Your Data

When your incident response team gets access to a new log data source, chances are that the events may not only contain an entirely different type of data, but may also be formatted differently than any log data source you already have. Having a data collection and organization standard will ease ma…

October 9, 2013

SECURITY

Making Boring Logs Interesting

In the last week alone, two investigations I have been involved with have come to a standstill due to the lack of attribution logging data. One investigation was halted due to the lack of user activity logging within an application, the other from a lack of network-based activity logs. Convincing th…