Avatar

Matt Valites

Information Security Investigator

Computer Security Incident Response Team (CSIRT)

Matthew Valites is a senior investigator on the Computer Security Incident Response Team (CSIRT). He specializes in building actionable high-fidelity detection techniques for network or system attacks and compromises, with a focus on targeted and high-value assets. Joining Cisco via the WebEx acquisition, he brings in-depth expertise building an Incident Response program for cloud and hosted service enterprises.

Matt's recent responsibilities include security investigations, mining security-centric alerts from large data sets, and mobile data forensics.

Articles

February 7, 2017

SECURITY

Cisco Hosting Amsterdam 2017 FIRST Technical Colloquium

2 min read

We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2017. The main event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 25th and 26th of April 2017. We are also offering an optional, free, training on Monday April 24th. Event […]

February 3, 2016

SECURITY

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

1 min read

We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016. The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will be free event with no registration charges (although […]

October 18, 2013

SECURITY

Getting a Handle on Your Data

9 min read

When your incident response team gets access to a new log data source, chances are that the events may not only contain an entirely different type of data, but may also be formatted differently than any log data source you already have. Having a data collection and organization standard will ease management and analysis of […]

October 9, 2013

SECURITY

Making Boring Logs Interesting

6 min read

This post centers around the practice of logging data - data from applications, devices, and networks - and how the components of data logging can help in the identification and remediation of network events.