- This event has passed so registration is closed.
Overview
Threat Intelligence is normally used to enrich the process of security assessment, providing proof on the enforcement of security controls required to be secure and compliant. As threat intelligence technology evolves, it has become more valuable and instrumental to security audit, providing needed context to the process of gap analysis, data collection, threat identification, and prioritization. During this session we will explore examples based on real world data where contextual threat intelligence can be applied directly to data security, compliance, and regulatory requirements in order to prioritize and accelerate the assessment process, obtain measure of business risk or liability, and reduce threats targeting the business.
During the presentation, you will learn the following:
• What Cyber Threat Intelligence (CTI) is and why is it important for cybersecurity
• How to use CTI to prioritize system security gaps and enhance security posture.
• How to examine your Digital Footprint in order to help predict targeted threat patterns.
• Understanding of how to use CTI findings to accelerating risk assessment.
Moderator
Lee Neely – Information Assurance APL, LLNL
Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely
Speaker/s
Christopher Strand – Chief Compliance Officer, IntSights
Christopher Strand is the Chief Compliance Officer at IntSights. As CCO, he is responsible for leading the global security risk and compliance business, helping companies bridge the gap between cybersecurity and regulatory cyber-compliance. Chris has more than 20 years of subject matter expertise in information technology and security audit assessment and he specializes in developing enterprise security platforms and markets within hyper-growth organizations.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.