Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?

Slides:



Advertisements
Similar presentations
A Guide to Executive Search: Forging Relationships with Executive Search Consultants A Panel Discussion Wednesday, 18 th April 2012.
Advertisements

© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
David A. Brown Chief Information Security Officer State of Ohio
Manage and Safeguard Your BC Career Cheyene Haase BC Management, Inc.
Manage Your BC Career Cheyene Haase BC Management, Inc. Elevating Your BC Career & Assessing Your Worth.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.
Premium Finance Strategies for Single Life and Survivorship.
Cybersecurity nexus (CSX)
Local Solutions to Global Problems fourth annual conference Investing in Regulatory Industries The Qumas Story David Grimes Co-Founder and COO.
INNOVATION: SUSTAINABLE DEVELOPMENT AND PROGRESS Josh Mays Michelle Moran Juliana Camilotti Steven Nguyen.
Group E: Balmaceda, Henry Montez, Monea Parra, Jorge Tjia, Claire.
Phoenix Convention Center Phoenix, Arizona ANDREA L. KINCAID DLA Energy Integrated Energy TrackIntegration of the Energy Industry.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Larry Clinton Operations Officer Internet Security Alliance
NTT Com Security - Welcome to the “Attack Detection & Incident Response” Security Brunch Tom Hager Country Manager.
ISSP Information Systems Security Partners | GiTi: 2015 Transforming IT Security Strategy: shifting focus from technologies to business process Artem Mykhailov.
Welcome to Unit 7 If you can see this slide, share with your classmates how your week is going so far. Audio will start promptly at 8 pm. Please stay connected.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Mark Lowry, CRO, Higher Logic Lee Weinstein, President, Syscom Services David DeLorenzo, CAE, Associate Executive Director, American Urological Association.
Management Team and Company Structure
MTRS3 Solutions and Services (SME, IL). MTRS in a nutshell  A security consulting company specialising in high risk environments (SME)  Main fields.
Cyber Security ⃝ Managing risk is at the forefront of every financial professional’s mind. CFMA Southern Ontario invites you to join in the discussion.
ISACA: 2016 AND BEYOND MATT LOEB (CGEIT, CAE) ISACA CHIEF EXECUTIVE OFFICER.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
THE BIG PICTURE: Area Reviews, Data and the Future of FE Andy Davison.
Cybersecurity as a Business Differentiator
J.T. Malatesta, Shareholder
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Hurricanes, Earthquakes, and Threat Intelligence
Paving the Way for Latinas in the US: The Roadmap to Power
Information Security Program
afceahi.org Web Site..... An AFCEA Special Event... Notes:
Making an Impact in a Global Society
Cybersecurity - What’s Next? June 2017
CHALLENGES AND OPPORTUNITIES BROUGHT BY FINTECH AND REGULATORY TECHNOLOGY MAY 2017.
Proactive Attack Prevention and Detection
New Research on Employee Engagement, Retention, and Development: Most Loved Companies In Partnership with: Agenda: Welcome, Panel Review, Intro to Experts,
Board Concerns About Cyber Security
Panel Discussion: C4I Solutions for Combating
Report by: Katiuscia Zedda
NYBA 2017 Technology, Compliance &
Automated Response with Windows Defender ATP
Business Ethics Dr. Aravind Banakar –
Business Ethics Dr. Aravind Banakar –
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Moderator: Don Pearson
Managing Information Technology
KORN/FERRY INTERNATIONAL
Moderator: Don Pearson
Introduction Appointed CEO upon formation of HomeRiver Group (“HRG”)
How to approach a top-down call topic in Horizon 2020?
The State of Cybersecurity and
National Cyber Security
Building Professional Services
25-Feb-19 ©Thomas E. Lah, 2001.
AllClear ID Executive Speakers
Presented By: Erez Hevroni
Information Services Security Management
AllClear ID Executive Speakers
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
Becoming Broadband Ready
SAP SuccessFactors + axonify
Energy Storage & Cyber Security
Dr.Jack Kavanaugh Healthcare Professional and Entrepreneur Slidehood.com.
Presentation transcript:

Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? AIR – T09F Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? Dr. Anton Chuvakin Research Vice President at Gartner @anton_chuvakin Brian Engle Sean McBride David Meltzer AIR-T09F - Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time? This lively panel will pit the promises of security providers against the needs of enterprise defenders. Panelists will share the threat intelligence traps organizations should avoid, and how to operationalize this data for faster, more effective incident response. Attendees will leave knowing whether they’re ready to take on threat intelligence and, if so, how to get the most out of their investment. Executive Director R-CISC @brianaengle Attack Synthesis Lead FireEye Chief Research Officer, Tripwire @davidjmeltzer

Top Threat Intelligence Questions Can we please clearly define threat intelligence (TI), one last time? How to operationalize threat intelligence at different maturity levels of security operations? What types of threat intel has the most value for organizations at different maturity levels? How do you understand the threat intelligence process? What organization resources are needed to make use of TI?

Moderator Dr. Anton Chuvakin @anton_chuvakin Dr. Anton Chuvakin is a Research VP at Gartner for Technical Professionals (GTP), covering topics like security monitoring, threat intel, incident response and others. He is a recognized security expert in the field of SIEM, log management and PCI DSS compliance. He is an author of books "Security Warrior," "PCI Compliance," "Logging and Log Management" and a contributor to "Know Your Enemy II," "Information Security Management Handbook" and others.

Panelists Sean McBride In 2009 Sean co-founded Critical Intelligence to help organizations that own and operate electric generating stations, oil refineries, and water plants understand threats to the industrial processes they operate. His company was acquired by iSIGHT Partners in 2016. He now leads the Attack Synthesis Team within FireEye iSIGHT Intelligence.

Panelists Brian Engle @brianaengle Brian Engle serves as the Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC), leading the organization from its inception to current state as the trusted resource for cybersecurity information sharing and intelligence for risk and fraud mitigation. The growing R-CISC community brings together consumer facing organizations in the retail and consumer products, goods and services industries.

Panelists David Meltzer @brianaengle David Meltzer is a security industry pioneer bringing a unique blend of technical expertise, entrepreneurial skill and market vision to his current position as Tripwire's Chief Technology Officer and Vice President of Corporate Development. Meltzer joined Tripwire through its acquisition of nCircle, where he served as Chief Technology Officer and Vice President of Engineering. Immediately prior to joining nCircle, Meltzer was Founder and Chief Technology Officer at Cambia Security, where he pioneered the industry's first agentless configuration compliance auditing solution.

Top Threat Intelligence Questions Can we please clearly define threat intelligence (TI), one last time? How to operationalize threat intelligence at different maturity levels of security operations? What types of threat intel has the most value for organizations at different maturity levels? How do you understand the threat intelligence process? What organization resources are needed to make use of TI?

Still A Common Challenge Get LOTS of threat intelligence ??? Profit! Original image with ??? PROFIT meme from South Park

Moderator Dr. Anton Chuvakin @anton_chuvakin Dr. Anton Chuvakin is a Research VP at Gartner for Technical Professionals (GTP), covering topics like security monitoring, threat intel, incident response and others. He is a recognized security expert in the field of SIEM, log management and PCI DSS compliance. He is an author of books "Security Warrior," "PCI Compliance," "Logging and Log Management" and a contributor to "Know Your Enemy II," "Information Security Management Handbook" and others.

Panelists Sean McBride In 2009 Sean co-founded Critical Intelligence to help organizations that own and operate electric generating stations, oil refineries, and water plants understand threats to the industrial processes they operate. His company was acquired by iSIGHT Partners in 2016. He now leads the Attack Synthesis Team within FireEye iSIGHT Intelligence.

Panelists Brian Engle @brianaengle Brian Engle serves as the Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC), leading the organization from its inception to current state as the trusted resource for cybersecurity information sharing and intelligence for risk and fraud mitigation. The growing R-CISC community brings together consumer facing organizations in the retail and consumer products, goods and services industries.

Panelists David Meltzer @brianaengle David Meltzer is a security industry pioneer bringing a unique blend of technical expertise, entrepreneurial skill and market vision to his current position as Tripwire's Chief Technology Officer and Vice President of Corporate Development. Meltzer joined Tripwire through its acquisition of nCircle, where he served as Chief Technology Officer and Vice President of Engineering. Immediately prior to joining nCircle, Meltzer was Founder and Chief Technology Officer at Cambia Security, where he pioneered the industry's first agentless configuration compliance auditing solution.

Apply What You Have Learned Today This will be created during the session