Power Your Cyber Threat Intelligence Program With Machine .

3y ago
35 Views
2 Downloads
216.28 KB
6 Pages
Last View : Today
Last Download : 2m ago
Upload by : Bennett Almond
Transcription

DAY 110:30 AM ETConference opens11:00 AM - 11:45 AM ETKeynote: Building and sustaining a successful threat intelligence programSpeaker(s): Mike Antico, CISO, CLEARCybersecurity Collaborative MemberThreat intelligence has transformed the information security world for the better but it’s not alwaysleveraged in the best way possible by organizations and departments. Depending on the business,threat intelligence can take on a whole new meaning, which can make things a bit difficult whenyou’re attempting to build a program. In his years of experience, Mike Antico, CISO at CLEAR, hascreated successful threat intelligence programs for an array of organizations. But it’s not just aboutbuilding the program, it’s training the staff and being able to federate the knowledge to the rightstakeholders in the business. In this fireside chat, Antico sits with SC Media Editor in Chief, JillAitoro, to discuss the most important steps security leaders should take to build a program, but mostimportantly, dive deep on the tactical versus the business risk perspective approaches they shouldtake.11:45 AM - 12:00 PM ETVisit exhibit hall12:00 PM - 12:30 PM ETWebcast: Power Your Cyber Threat Intelligence Program with Machine LearningSpeaker(s): Joe Gehrke, Solutions Architect, AnomaliPresentation by: Anomali12:30 PM - 12:40 PM ETVisit exhibit hall12:40 PM - 1:10 PM ETWebcast: Cyber Attack Trends 2020 Mid-Year ReportSpeaker(s): Yoav Arad Pinkas, Intelligence Analyst, Check Point ResearchPresentation by: Check Point Software Technologies1:10 PM - 1:20 PM ETVisit exhibit hall1:20 PM - 1:50 PM ETWebcast: Extracting Threat Intelligence from Billions of Monthly Emails & Web ClicksSpeaker(s): Mark Toshack, Principal Product Manager at MimecastPresentation by: Mimecast

1:50 PM - 2:00 PM ETVisit exhibit hall2:00 PM - 2:30 PM ETWebcast: Transforming Threat Intelligence with SOAR: An integrated approach tointelligent threat huntingSpeaker(s): Jay Spann, SOAR Evangelist & Technical Product Marketing Manager at SwimlanePresentation by: Swimlane2:30 PM - 2:40 PM ETVisit exhibit hall2:40 PM - 3:10 PM ETWebcast: The Cyberthreat That Just Won’t Die OR Know Your Enemy: Ransomware in2020Speaker(s): Seth Geftic, Product Director, SophosPresentation by: Sophos3:10 PM - 3:20 PM ETVisit exhibit hall3:20 PM - 3:50 PM ETWebcast: The Billion Dollar Security BlanketSpeaker(s): Matt Ashburn, Engagement Lead, Authentic8Presentation by: Authentic83:50 PM - 4:00 PM ETVisit exhibit hall4:00 PM - 4:30 PM ETWebcast: Simplifying the Threat Intelligence Selection ProcessSpeaker(s): Chris Davis, Senior Threat Intelligence Sales Engineer, KasperskyPresentation by: Kaspersky4:30 PM - 4:40 PM ETVisit exhibit hall4:40 PM – 5:10 PM ETWebcast: Get there first: Shrink your attack surface with better threat intelSpeaker(s): Brandon Hoffman, CISO, NetenrichPresentation by: Netenrich

DAY 210:30 AM ETConference opens11:00 AM - 11:45 AM ETKeynote: Carpe Theatrum: The Psychology behind Successful CyberattacksSpeaker(s): Ed Moyle, Co-founder, Security Curve and Diana Kelley, Co-founder, SecurityCurve and Cybersecurity Field CTO, MicrosoftIn this fireside chat, Ed Moyle, founder of SecurityCurve and Diana Kelley, Cybersecurity FieldCTO at Microsoft will discuss the drivers behind what makes us click. We'll explain howattackers leverage our natural instincts to launch attacks by leaning into the headlines andmemes of the moment.Takeaways from the conversation:·Cialdini's 6 Dimensions of influence·How attackers use these dimensions·Methods for more effective security awareness training11:45 AM - 12:00 PM ETVisit exhibit hall12:00 PM - 12:30 PM ETWebcast: The DevSecOps Prescription for HealthcareSpeaker(s): Surag Patel, Chief Strategy Officer, ContrastPresentation by: Contrast12:30 PM - 12:40 PM ETVisit exhibit hall12:40 PM - 1:10 PM ETWebcast: All the Threats: Get Proactive With Threat Modeling and Threat HuntingSpeaker:Speaker(s): Brad Mecha, Principal Architect at Recorded FuturePresentation by: Recorded Future1:10 PM - 1:20 PM ETVisit exhibit hall1:20 PM - 1:50 PM ETWebcast: Optimizing Threat Intel

Speaker(s): Jose Barajas, Technical Director, NA Sales Engineering, AttackIQPresentation by: AttackIQ1:50 PM - 2:00 PM ETVisit exhibit hall2:00 PM - 2:30 PM ETWebcast: Understanding The Threat Landscape and Impacts of COVID-19Speaker(s): Paul Wang, Threat ResearcherBrett Shaw, Sr. Product Marketing ManagerPresentation by: Proofpoint2:30 PM - 2:40 PM ETVisit exhibit hall2:40 PM - 3:10 PM ETWebcast: Anchor, Bazar, and the Trickbot ConnectionSpeaker(s): Lior Rochberger, Senior Threat Researcher & Threat Hunter, CybereasonDaniel Frank, Senior Malware Researcher, CybereasonPresentation by: Cybereason3:10 PM - 3:20 PM ETVisit exhibit hall3:20 PM - 3:50 PM ETPresentation by: Google Cloud3:50 PM - 4:00 PM ETVisit exhibit hallDay 310:30 AM ETConference opens11:00 AM - 11:45 AM ETKeynote: Forewarned is Forearmed: Utilizing the Cyber Resiliency Level FrameworkSpeaker(s): Dr. Dawn M. Beyer, Senior Fellow, Lockheed Martin and Jacquelyn Blanchard,Space Chief Cyber Architect, Lockheed Martin

Threat intelligence is foundational to resilient systems. The Lockheed Martin Cyber ResiliencyLevel (CRL ) provides a framework that organizations can use to measure how cyber securetheir systems are and offers a roadmap for how to mature networks. Threat intelligence isrequired as systems scale the roadmap and reach the highest levels of the framework. Join usand learn more about how you can leverage CRL and threat intelligence to design moreresilient systems.11:45 AM - 12:00 PM ETVisit exhibit hall12:00 PM - 12:30 PM ETPresentation by: DomainTools12:30 PM - 12:40 PM ETVisit exhibit hall12:40 PM - 1:10 PM ETWebcast: Scaling the Threat Intelligence Program Maturity ModelSpeaker(s): Wade Woolwin, Principal Threat Intelligence Researcher, Rapid7Presentation by: Rapid71:10 PM - 1:20 PM ETVisit exhibit hall1:20 PM - 1:50 PM ETPresentation by: Radware1:50 PM - 2:00 PM ETVisit exhibit hall2:00 PM - 2:30 PM ETWebcast: Zero Trust: A New Paradigm for SecuritySpeaker(s): Aaron Keeling, Sales Engineer, LogrhythmPresentation by: Logrhythm2:30 PM - 2:40 PM ETVisit exhibit hall2:40 PM - 3:10 PM ETPresentation by: VMWare3:10 PM - 3:20 PM ETVisit exhibit hall

Keynote: Building and sustaining a successful threat intelligence program Speaker(s): Mike Antico, CISO, CLEAR Cybersecurity Collaborative Member Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organizations and departments. Depending on the business,

Related Documents:

Shared third-party threat information via the Cyber Threat Alliance further enriches this knowledge base. The Cyber Threat Alliance is a consortium of 174 different threat intelligence and threat feed providers that crowdsource and share threat intelligence. Cyber Threat Alliance processes more than 500,000 file samples and 350,000 URLs daily.

a cyber threat intelligence capability. 2.0 Research Paper: Cyber Threat Intelligence 6 A detailed analysis summarising of key industry and academic research detailing the requirements for a collaborative and federated cyber threat intelligence capability. High Priority Targets 9 Data, Information & Intelligence 11 Big Data Analytics 12

fenders to explore threat intelligence sharing capabilities and construct effective defenses against the ever-changing cyber threat landscape. The authors in [17] and [18] identify gaps in existing technologies and introduce the Cyber Threat Intelli-gence model (CTI) and a related cyber threat intelligence on-tology approach, respectively.

The Cyber Threat Framework supports the characterization and categorization of cyber threat information through the use of standardized language. The Cyber Threat Framework categorizes the activity in increasing “layers” of detail (1- 4) as available in the intelligence reporting.

What is Cyber Threat Intelligence and how is it used? . As organisations of all shapes and sizes globally increasingly adopt a Risk-based approach to managing cyber threats in line with best-practice, there has been a commensurate rise to prominence of cyber threat intelligence. . involve sign

Cyber Vigilance Cyber Security Cyber Strategy Foreword Next Three fundamental drivers that drive growth and create cyber risks: Managing cyber risk to grow and protect business value The Deloitte CSF is a business-driven, threat-based approach to conducting cyber assessments based on an organization's specific business, threats, and capabilities.

The Cyber Threat Framework supports the characterization and categorization of cyber threat information through the use of standardized language. The Cyber Threat Framework categorizes the activity in increasing “layers” of detail (1- 4) as available in the intelligence reporting.

these changes is to build an effective threat intelligence program. Threat intelligence has already become a key component of security operations established by companies of varying sizes across all industries and geographies. Provided in human‑readable and machine‑readable formats, threat intelligence can support security