Threat Intelligence
Category

Threat Intelligence

With each new threat comes a learning curve to mitigating the risk. With threats evolving at the speed of light, how can security professionals speed up the learning curve? Hear from our industry and government experts on the value of information sharing and what means to use in order to protect yourself without exposing vulnerabilities.

Threat Intelligence

Evolution of the Threat Landscape

Chris Hallenbeck - Tanium  •   • 

Start this Session

'Reactive to Proactive': A Look at Cyber Threat Intelligence in Security Programs

Session In Development  • 

Rajesh Thapar - Yes Bank  •   • 

Preview this Session

Acquiring and Operationalizing Threat Intelligence for OT Environments

Kaustubh Medhe - Reliance Industries  •   • 

Start this Session

The Role of Threat Intelligence in Cyber Resilience

Andy Norton - Lastline  •   • 

Start this Session

Soaring Global Cyber-Gotchas: Dissecting the Ever-Expanding Threat Landscape

Jeannette Jarvis - Fortinet  •   • 

Start this Session

Not All Threat intelligence is Equal, Some Are More Equal Than Others

Bryn Norton - CenturyLink  •   • 

Start this Session

Making Threat Intel Actionable - Using TI to Track & Defeat Cybercriminals

Brian Hussey - Trustwave  •   • 

Start this Session

Handling Threat Intelligence and Hunting Operations with AI

Sridhar Sidhu - Wells Fargo  •   • 

Start this Session

Intelligence-First: Role of Cyber Threat Intelligence in Security Programs

Sunil Varkey - Wipro Limited  •   • 

Start this Session

We Make It, You Break It: Why Enterprises Are Investing in Bug Hunters to Intentionally Hack Their Systems

Jon Green - Aruba - a Hewlett Packard Enterprise Company , Craig Ingram - Heroku  •   • 

Start this Session

Intelligence Sharing Advances: How IOCs Helped Thwart U.S. WannaCry Breaches

Elie Nasrallah - HITRUST in cooperation with Trend Micro  •   • 

Start this Session

Breaches: How to Use Threat Intelligence to Generate IOCs; Other Tips to Find, Analyze and Mitigate Risk

Paul Bowen - Arbor Networks  •   • 

Start this Session

Asia's Data Breach Trends: Tackling the New Age Cyber Threats

Session In Development  • 

Dr. Sanjay Bahl - CERT-In  •   • 

Preview this Session

The Challenge of Operationalizing Threat Intelligence to be Actionable

Session In Development  • 

Brian Soldato - NSS Labs  •   • 

Preview this Session

Session Contributors

Andy Norton

Director, Threat Intelligence, Lastline

Read Bio
Ben Lindgreen

Head of Security Delivery, Payments UK

Read Bio
Brian Hussey

VP of Cyber Threat Detection & Response, Trustwave

Read Bio
Brian Soldato

Senior Director of Product Management, NSS Labs

Read Bio
Bryn Norton

Director Solutions Architecture and Security EMEA, CenturyLink

Read Bio
Chris Hallenbeck

CISO, Americas, Tanium

Read Bio
Christopher Beier

IT Security & Product Consultant, IBM Security

Read Bio
Craig Ingram

Product Security Lead, Heroku

Read Bio
Dr. Phyllis Schneck

Managing Director & Global Leader of Cyber Solutions, Promontory; Fmr Deputy Under Secretary for Cybersecurity, DHS

Read Bio
Dr. Sanjay Bahl

Director General - CERT-In

Read Bio
Ed Ferrara

VP and Principal Analyst, Forrester Research

Read Bio
Elie Nasrallah

Director, Cybersecurity Strategy, HITRUST in cooperation with Trend Micro

Read Bio
George Tubin

Director of Marketing, Transmit Security

Read Bio
Jason Greenwood

Senior Vice President, ThreatTrack

Read Bio
Jeannette Jarvis

Director, Product Marketing, FortiGuard Labs

Read Bio
Jeremy King

International Director, PCI Security Standards Council

Read Bio
Jigar Kadakia

CISO & CPO, Partners HealthCare

Read Bio
Jim Penrose

EVP of Cyber Intelligence, Darktrace

Read Bio
Jon Green

VP and Chief Technologist for Security, Aruba - a Hewlett Packard Enterprise Company

Read Bio
Joseph Burton

Managing Partner, Duane Morris LLP

Read Bio
Kaustubh Medhe

General Manager-Cyber Defense Center and Head-SoC & Data Security, Reliance Industries

Read Bio
Kim Peretti

Co-Lead, Cybersecurity Preparedness and Response practice, Alston and Bird, and Former DOJ Cybercrime Prosecutor

Read Bio
Malcolm (M.K.) Palmore

VP, Field CSO, Palo Alto Networks

Read Bio
Maria Ramirez

Head Deputy, Cyber Crime Division, Los Angeles County District Attorney's Office

Read Bio
Mark McGovern

VP Product Management, CA

Read Bio
Matthew Braverman

Supervisory Special Agent, Washington Field Office, FBI

Read Bio
Michael Daniel

President, Cyber Threat Alliance, and Former Cybersecurity Coordinator and Special Assistant to the President

Read Bio
Michael J. Wyffels

Senior Vice President and Chief Technology Officer, QCR Holdings Inc.

Read Bio
Michael Zweiback

Partner and Co-Founder, Zweiback Fiset & Coleman LLP

Read Bio
Mitch Zahler

CISO, Proactive Cyber Security; formerly Senior Vice President of Cybersecurity, HSBC

Read Bio
Paul Bowen

Principal Security Technologist, Arbor Networks

Read Bio
Paul Cordero

Modeling Architect, Brighterion

Read Bio
Ralph Smith

Exercises and Projects Associate, FS-ISAC

Read Bio
Richard Bortnick

Cyber Liability and Insurance Attorney, Traub Lieberman Straus & Shrewsberry, LLP

Read Bio
Robert Villanueva

Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Read Bio
Sridhar Sidhu

Senior Vice President - Enterprise Information Security, Wells Fargo

Read Bio
Sunil Varkey

CISO, Wipro Limited

Read Bio
Tom Field

Senior Vice President, Editorial, ISMG

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.