How To Effectively Analyze Threat Intelligence Data

How To Effectively Analyze Threat Intelligence Data

 

Available On Demand
Duration 1h 0min
Speakers
Sara Peters
Contributing Editor
Dark Reading
Sara Peters
Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.
Cheryl Biswas
Cyber Security Analyst – Threat Intel
KPMG
Cheryl Biswas
Cheryl Biswas is part of KPMG Canada's cybersecurity team in threat Intel. She is fascinated by APTs, and passionate about securing mainframes, and ICS Scada. She builds bridges as well as building security awareness. She holds a specialized honors degree in political science, and is ITIL designated. In addition to speaking at BSidesLV, Circle City, BSidesTO and the upcoming SecTor, Cheryl has been a guest on podcasts and television, and is an active writer and blogger. You'll find her on Twitter as @3ncr1pt3d.
Haydn Johnson
Senior Consultant
KPMG
Haydn Johnson
Haydn has over 3 years of information security experience within the Big 4 firms, including network/web Penetration Testing, Vulnerability Assessments, Identity and Access Management, and Threat Intel. Haydn has a Masters in Information Technology, the OSCP and GXPN certifications and regularly contributes to the community primarily via Twitter. He has spoken at BSidesTO, BSidesLV and Circle City Con on talks ranging from Purple Teaming to Mainframes.
Stephen Ginty
Co-founder
RiskIQ's PassiveTotal
Stephen Ginty
Steve is the co-founder of RiskIQ's PassiveTotal, a powerful data visualization technology that lights up the footprint of an attacker, making threat investigations and incident response quicker. Steve has more than nine years of experience in the IT Security Industry. He has spent the past five years researching targeted intrusions against Fortune 500 organizations. His experience includes leading a team of multi-disciplined researchers implementing proactive methodologies to track threat actor infrastructure and malware associated with attack activity. His primary areas of research include threat infrastructure analysis and threat data visualization.

Today’s enterprises have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT and other vulnerability reporting sites. How can you correlate this information to identify sophisticated cyberattacks? What processes can you use to ferret out the relevant threat data and stop the most complex exploits before they result in a data breach?
 
In this in-depth webinar on September 28th, top security experts will:

  • Outline a wide range of tips and best practices for analyzing threat information
  • Identify the red flags that might indicate a compromise of your enterprise

Attend and you will:

  • Get insight on how to filter out the most relevant threat data
  • Learn how to correlate that data with other indicators of compromise
  • Learn how to pinpoint an attack quickly – before your critical data is breached
Already a member? Login