Loading Session...

Effective Threat intelligence Program Insights.

Session Information

A primary concern for most CISOs and security professionals is how to effectively reduce risk within their organizations. They must identify improvements to data, tools, processes, and personnel to significantly reduce the risk and impact of financial, technical, and organizational cyber threats to their organizations. Effectively integrating threat intelligence into an organization’s security posture requires a comprehensive approach not solely focused on data. Rather, security professionals must determine the impact of threat intelligence across the entire company; how it’s used, how it can be integrated, who is impacted, who uses its output, and what can be improved.

 

The presentation will cover:

  • Key aspects of threat intelligence CISOs should consider
  • Success stories from organizations leveraging threat intelligence
  • Teams, structures, and processes that must be introduced or exist for success
  • Threat intelligence program functions that must be considered for effective results
  • Correlating, refining, and integrating threat intelligence with another security infrastructure
  • And data, processes, and personnel metrics that must be collected to maximize impact on the organization.
Jun 21, 2017 09:45 AM - 10:15 AM(America/Chicago)
Venue : Auditorium
20170621T0945 20170621T1015 America/Chicago Effective Threat intelligence Program Insights.

A primary concern for most CISOs and security professionals is how to effectively reduce risk within their organizations. They must identify improvements to data, tools, processes, and personnel to significantly reduce the risk and impact of financial, technical, and organizational cyber threats to their organizations. Effectively integrating threat intelligence into an organization’s security posture requires a comprehensive approach not solely focused on data. Rather, security professionals must determine the impact of threat intelligence across the entire company; how it’s used, how it can be integrated, who is impacted, who uses its output, and what can be improved.

 

The presentation will cover:

Key aspects of threat intelligence CISOs should consider Success stories from organizations leveraging threat intelligence Teams, structures, and processes that must be introduced or exist for success Threat intelligence program functions that must be considered for effective results Correlating, refining, and integrating threat intelligence with another security infrastructure And data, processes, and personnel metrics that must be collected to maximize impact on the organization.
Auditorium Borderless Cyber USA / New York / 21-22 June 2017 events@oasis-open.org
864 visits

Session Participants

User Online
Session speakers, moderators & attendees
Chief Technology Officer
,
LookingGlass Cyber Solutions Inc.
Moderators public profile is disabled.
Attendees public profile is disabled.
8 attendees saved this session

Session Chat

Live Chat
Chat with participants attending this session

Questions & Answers

Answered
Submit questions for the presenters

Session Polls

Active
Participate in live polls

Need Help?

Technical Issues?

If you're experiencing playback problems, try adjusting the quality or refreshing the page.

Questions for Speakers?

Use the Q&A tab to submit questions that may be addressed in follow-up sessions.