Know Thyself: Cyber Threat Intelligence Gathering Inside Your Organization

Some of the most important threat intelligence resides right inside your own organization. What can you learn by taking a closer look at your SIEM, internal telemetry, user lists, and other sources?

In this webinar, learn about the tools that can help your internal threat intelligence gathering and how these efforts could help you detect attackers’ lateral movement, disrupt ransomware and protect endpoint devices.

Available:
Wed, Dec 04, 2019 10:00 AM PST / 01:00 PM EST
Duration:
1h 00min

Attend this webinar and you'll learn:

  • How to identify the richest sources of threat intel in your organization – including the human ones
  • What data and indicators to look for on these sources, and how to find them
  • Ways to fine-tune your monitoring tools to gather even more effective intelligence

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • A.J. Nash
    A.J. Nash
    Director of Cyber Intelligence Strategy
    Anomali

    A.J. Nash is the Director of Cyber Intelligence Strategy for Anomali. As a cyber intelligence strategist and public speaker, he is primarily focused on building cyber intelligence programs that capitalize on disparate data and information to create and deliver tactical, operational, and strategic intelligence to protect personnel, facilities, data, and information systems. A.J. honed his skills across 18 years of military service and defense contracting, serving in roles focused on intelligence collection, analysis, reporting, and briefing. His career included near real-time intelligence collection and reporting in support of combat operations in multiple areas of operations (AORs), indications and warning (I&W), tracking war criminals, battling human trafficking, countering improvised explosive device (IED) production and deployment, and combating nation-state, criminal, and hacktivist threats in cyberspace. A.J.’s work has been delivered to military and government decision-makers, including intelligence agency Senior Executives and Directors, the U.S. Secretary of State, Congress, and the White House. A.J. holds a B.S.in Liberal Studies from Excelsior College and a M.A in Organizational Leadership from Gonzaga University.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By