This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
As a Sr. Product Marketing Manager at ExtraHop, Chase strives to extract the signal from the noise in the cybersecurity market, to provide security leaders and practitioners with information they can actually use to stay ahead of advanced persistent threats. Chase would never claim to be an expert at anything, but some topics he has above-average knowledge about include network detection and response, security operations, cryptography, and a grab bag of cybersecurity frameworks including NIST CSF, MITRE ATT&CK and D3FEND, and the CIS Top 20 controls.
Software Supply Chain Attack vs. Supply Chain Vulnerability: What's The Difference?
Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage
Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities
Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings
When They're Already Inside the Walls: How to Detect and Stop Lateral Movement
Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response
What is Mitre D3FEND?
ExtraHop is the Founding NDR Provider in the XDR Alliance
SIEM Alone Won't Stop Advanced Threats. Integrated NDR & SIEM Can. Here's Why.
ExtraHop Contributes Network Security Expertise to MITRE ATT&CK Framework
Top 3 Trends from the 2021 Verizon DBIR
Announcing Reveal(x) 360 NDR in the CrowdStrike App Store
New eBook: Why the Time Is Right for Network and Security Collaboration
The Ground Truth: Securing Remote Work with Collaborative NetSecOps
Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?
Behavior-Based Detection and Rule-Based Detection: Why Not Both?
How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags
Strange Behavior: The Case for Machine Learning in Cybersecurity
How To Monitor Sensitive Data & Stop Exfiltration via The Network
How To Get a Complete Inventory of Devices on Your Network
Remote Work Isn't Going Away. Here's How to Secure WFH For The Long Haul
Gartner Report on Handling Challenges with TLS 1.3 and Passive Decryption
How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
Cloud-Native NDR & EDR With CrowdStrike and ExtraHop
What's Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020
Most Security Pros Wish Their Company Did More Threat Hunting. Here's How They Can.
ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments
The ExtraHop Reveal(x) Demo: NDR At Your Fingertips
Threat Investigation Speed Run with ExtraHop Reveal(x)
Announcing ExtraHop Reveal(x) for Midsize Enterprises
Network Detection & Response (NDR) for NIST
Video Feature Short: On-Demand Executive Report
How Decryption Helped Beat the Nazis
Network Detection & Response vs. Network Traffic Analysis
How Orgs Should Approach Shadow IT (& How NDR Can Help)
Why Are Enterprises Enabling TLS 1.3 Encryption?
2019 SANS SOC Survey Results
How to Apply CIS Controls & MITRE ATT&CK in the Cloud
SANS Webinar - Network Detection & Response (NDR) Meets MITRE ATT&CK
SCMedia Webinar: Accelerating Incident Response through Network Traffic Analysis
What Is Cross-Site Scripting (XSS) & How To Prevent It
Basic Threat Hunting with Reveal(x)
Network Detection & Response for MITRE ATT&CK
Real Answers to Real Questions About AI
Boost SOC Analyst Productivity with Reveal(x) Spring '19
Case Study: Proactive Security Hygiene in a Hybrid Enterprise
Improve Threat Hunting & IR with NTA: ISC2 Briefing
ISC2 Security Briefing: Getting More Value from SecOps Frameworks
Network Detection & Response (NDR) vs. SIEM
Network Detection & Response (NDR) vs. Intrusion Prevention Systems (IPS)
Feature Short: Cyber Hygiene & Encryption Audit
Network Detection & Response (NDR) vs. Intrusion Detection Systems (IDS)
Reveal(x) Winter 2019 Sounds the Klaxon
Reveal(x) Feature Short: Signal Metrics
Reveal(x) Feature Short: Threat Intelligence
Five Reasons You Need to Decrypt Traffic for SecOps Analysis
Reveal(x) Feature Short: Investigation
Network Traffic Analysis for Enterprise Security
Signal From Noise: ExtraHop Reveal(x) Signal Metrics
DDoS Protection Primer: Types and Mitigation Explained
The SANS 2018 SOC Survey Results Are In!
Answer InfoSec Questions on Twitter - Win Night Vision Goggles at Black Hat!
What Is Network Traffic Analysis (NTA)?
What's Under The Hood of Reveal(x) Summer 2018
INFOGRAPHIC - SecOps Face Off
Unpacking the Looming Challenge of Encryption Inside the Enterprise: Part 2
Unpacking The Looming Challenge of Encryption Inside The Enterprise: Part 1
The Top 3 Takeaways from RSA 2018
What Is Dwell Time in Cyber Security?
The NSA Doesn't Need Zero-Days to Crack Your Network
Automating Ransomware Prevention with ExtraHop and Citrix Octoblu
Customer Testimonial Video Series: "Total Visibility with a Single Monitoring Platform"
Webinar: Ransomware and How to Stop It
The End of Briforum and the Future of Monitoring on Brian Madden's Penultimate Podcast
VIDEO: ExtraHop Enables Seamless IT Operations at Phoenix Children's Hospital
Survey: The 7 Biggest Hurdles for IT Teams Implementing Big Data (And How to Get Past Them)
VIDEO: Keeping Paychecks On-Time at The Department of Veterans Affairs
Video: ExtraHop Co-Founder Talks iPhone Hacking & IT Visibility at Infosecurity Europe
Mobile Carrier Replaces 20 Troubleshooting Tools with a Single Monitoring Platform
How to Dodge the Microservices Tax
Three Reasons to Meet ExtraHop At An Upcoming VMUG
The NSA's Worst Nightmare
How Much Data Does The Super Bowl Create?
Live Wire, The Next Dimension for Streaming Analytics [WEBINAR]
Q&A: The Key to Healthcare Big Data Analytics
Happy ICD-10 Day! Here's Some Required Reading for a Smooth Switch
What Is Wire Data? (Video)
What is FHIR (Fast Healthcare Interoperability Resources)?
ITOA Spotlight: Turning IT Into a Profit Center