Strategies for Using Cyber Threat Intelligence

Between threat intelligence tools, industry ISACs, and a wide range of other services, IT organizations are flooded with ways to keep up to date on the latest security threats. But without mechanisms in place to actually use the information, these alerts provide little benefit. Learn how your IT organization can develop processes to quickly digest threat data and turn it into real actions, improving response to new threats and increasing overall security.

Available:
On Demand
Duration:
1h 00min

When you attend this webinar, you'll learn:

  • Tools and methods to help organize and prioritize threat data feeds
  • Techniques to quickly identify which threats and vulnerabilities are the highest priority to your organization (no matter what the CVSS score is)
  • Strategies for improving threat response while reducing alerts

Featured Speakers

  • John Sawyer
    John Sawyer
    Associate Director of Services
    IOActive, Inc.

    John H. Sawyer is the red team lead and specializes in targeted attacks, social engineering, and post-exploitation. After more than 15 years in IT security experience, he’s a member of DEF CON 14’s and 15’s CTF winners (1@stplace), co-founder the University of Florida Student Infosec Team, and founder of SwampSec. John is a respected author and trainer for organizations including Dark Reading and InformationWeek Magazine, Interop, BruCON, OWASP AppSec DC, SANS, and B-Sides Jacksonville.

  • Tim Helming
    Tim Helming
    Director of Product Management
    DomainTools

    Tim Helming, DomainTools Director of Product Management, has over 15 years of experience in information security, from DNS and network to cloud to application attacks and defenses. At DomainTools, he applies this background to helping define and evangelize the company's growing portfolio of investigative and proactive defense offerings. At WatchGuard, he helped define and launch some of the best-selling SMB security appliances in the market. Tim has spoken at security conferences such as FIRST, InfoSec World, BSides Las Vegas, FireEye/MIRcon, and AusCERT, as well as media events and technology partner conferences worldwide.

  • Sara  Peters
    Sara Peters
    Contributing Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By