Identifying Security Risks: Threat Hunting & Incident Response

10/21/2025 11:00 AM - 10/21/2025 12:00 PM

Description

Effective cybersecurity means not just reacting to attacks, but actively searching for hidden threats before they cause damage. In this session Mauriella DiTommaso and Cody Wilson covers the essentials of threat hunting and incident response, helping you identify risks early and respond with confidence.

 

Speakers

Woman with glasses in front of flags

Mauriella DiTommaso
Network Forensics Chief

Cybersecurity and Infrastructure Security Agency (CISA)

Mauriella DiTommaso is currently serving as the Network Forensics Chief within CISA's Threat Hunting Subdivision. Mauriella is a cybersecurity leader and U.S. Army veteran with over two decades of experience across military, federal and state government service. She excels in leading cybersecurity programs and digital forensics teams, developing comprehensive policies and programs, and managing high-profile security incidents. Mauriella has enhanced organizational cybersecurity across government sectors through strategic leadership and innovative approaches to tactical and operational mission execution. Mauriella’s experience extends to academia as a program director, adjunct faculty member and course developer where she manages undergraduate and graduate-level courses on digital forensics and cybersecurity, preparing future leaders in the field.

 

Man smiling with mountains behind him

Cody Wilson 
Incident Response & Threat Hunting Lead
Cyberscurity and Infrastructure Security Agency (CISA)

Cody Wilson is an Incident Response & Threat Hunting Lead within CISA’s Threat Hunting Subdivision, where he directs expeditionary hunt and incident‑response teams countering nation‑state activity across U.S. critical infrastructure. A U.S. Army veteran, Wilson brings more than eight years of combined leadership across military and federal service. He excels at network forensics and threat hunting, building tradecraft and detection content, and managing high‑profile engagements that strengthen partners’ cyber readiness across the 16 critical infrastructure sectors. His technical leadership and authorship span cornerstone U.S. Government guidance, including serving as lead technical contributor to the multi‑agency advisory, "Countering Chinese State‑Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System" (Sept. 3, 2025), as well as prior work on the flagship Volt Typhoon advisory and joint guidance on Identifying and Mitigating Living‑Off‑the‑Land (LOTL) techniques. Wilson’s contributions also extend to publishing applied cybersecurity research and briefing senior leaders across government and industry.

Online Meeting Information

Microsoft Teams Need help?

Join the meeting now

Meeting ID: 294 429 798 947 8

Passcode: Yi24s26W