The cost to attack and compromise a system is orders of magnitude less than the cost to defend. A single machine can target thousands of targets searching for one with susceptible defenses while each new attack vector requires defenders to deploy and maintain additional security controls. So, how can we increase the cost for the attacker? One way is through collaborative threat intelligence.
Join Wendy Nather of 451 Research and Jaime Blasco, Director of AlienVault Labs for a discussion of the value of collaborative threat intelligence. Wendy and Jaime will discuss how a collaborative approach differs from other threat intelligence sources, along with practical considerations to help you evaluate threat intelligence offerings and protect your environment.
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”AlienVault
Despite significant investments in the latest preventative security technologies, organizations continue to suffer devastating security breaches. And, attacks are not limited to just the big companies, smaller organizations are facing the same threats. If even the largest companies are struggling to avoid breaches, how can smaller teams with more limited security staff and budgets hope to avoid that same fate?
Join Fran Howarth of Bloor Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:
Developments in the threat landscape driving a shift from preventative to detective controls
Essential security controls needed to defend against modern threats
Fundamentals for evaluating a security approach that will work for you
How a unified approach to security visibility can improve threat detection
Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches
Is your IT security team suffering from alert fatigue? For many organizations, chasing down every security alert can tax an already overburdened IT department, often resulting in a breach that might have been avoided. Adding to this challenge is an increase in sophisticated threats that strike so fast and frequently, traditional methods of investigation and response can’t offer adequate protection.
A new webcast from CrowdStrike, “Proactive Threat Hunting: Game-Changing Endpoint Protection Above and Beyond Alerting,” discusses why so many organizations are vulnerable to unseen threats and alert fatigue, and why having an approach that is both reactive and proactive is key. You’ll also learn about Falcon OverWatch™, CrowdStrike’s proactive threat hunting service that investigates and responds to threats immediately, dramatically increasing your ability to react before a damaging breach occurs.
Download the webcast slides to learn:
--How constantly reacting to alerts prevents you from getting ahead of the potentially damaging threats designed to bypass standard endpoint security
--Why an approach that includes proactive threat hunting, sometimes called Managed Detection and Response, is key to increasing protection against new and advanced threats
--How CrowdStrike Falcon OverWatch can provide 24/7 managed threat hunting, augmenting your security efforts with a team of cyber intrusion detection analysts and investigators who proactively identify and prioritize incidents before they become damaging breaches
This talk will include an overview and demo of the Open Threat Exchange (OTX) and describe some of its information sources, including anonymous sharing from Open Source Security Information Management (OSSIM.) Jaime will share some of his experiences using OTX as a security researcher. He will also provide his thoughts on how OWASP members can benefit from security research and threat intelligence to "build in" security rather than constantly reacting.
State of Endpoint Security: The Buyers MindsetCrowdStrike
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers?
As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy – from enhancing efficacy to reducing complexity and agent bloat. A new webcast, “State of the Endpoint: The Buyer Mindset,” discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss today’s most important security issues. Join them as they explore the findings from a new research report, “Trends in Endpoint Security: A State of Constant Change,” a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward.
Join this webcast to learn:
-The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why
-Best of breed vs. comprehensive suites – which approach do your peers prefer and what are the advantages and challenges of each?
-How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
Your agents are fatigued and overwhelmed from fighting rogue attacks, and tailing covert ghost alerts. Meanwhile, the backdoor to your organization has been blown wide-open and cyber attackers are stealing the crown jewels. You need help.
From this mission:
• Uncover how to mitigate ghost alerts and empower your agents to focus on more important security priorities
• Leverage your current security investments-- instead of replacing them
• Learn how automation reduces the need for manual investigation and response
Data Protection becomes increasingly important, especially in the digital world. Data Protection by Design and by Default (“DPbDD”) plays a critical role in this connection and has been enshrined in Article 25 the EU General Data Protection Regulation (“GDPR”). Data Protection by Design requires that data protection principles are to be taken into consideration at the earliest stage of the design process, while Data Protection by Default should ensure that, by default, only personal data that are necessary for each purpose of the processing are processed.
Even though Article 25 GDPR specifically addresses data controllers (e.g. companies or public administrations using software for processing personal data), developers may find it useful to get familiar with DPbDD requirements for creating GDPR compliant software that enables data controllers to fulfill their data protection obligations. This could possibly lead to competitive advantages over competitors who do not design their products with data protection principles in mind.
Drawing from CrowdStrike's work, Cayce Beames will present evolving cybersecurity threats, discussed her thoughts on why traditional security is failing and shared a bit on what this "next generation endpoint protection" is about.
Cayce has been working in technology for over 25 years. From IT Systems Administration to Network Engineering and Internet Security, Risk Management and Compliance Auditing, Cayce has consulted with many Global corporations and traveled extensively. Cayce is currently a governance, risk and compliance analyst at CrowdStrike and founder of the not for profit, public benefit, education for kids organization called "The Computer Club" where she works to inspire kids and adults to address their fear of the unknown and make something awesome with technology.
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
With recent attacks on hospital data catching headlines, we wanted to provide some best practices in this webinar to keep your systems safe and sound! We will be co-presenting this webinar with our partners at Intellisuite IT Solutions.
What you will learn:
How-to use an Intranet to educate staff on IT security
How-to Engage staff in pro-active thinking about IT and patient privacy with a social Intranet tools.
How a proactive IT plan and an Intranet can help keep an organization safe from Ransomware Attacks
How-to publish and ensure readership on HITECH, HIPPA and other IT policies across the entire hospital using a web based Policy Manager
How an Intranet can alert staff of an attack and train staff on ways to prevent attacks
How to leverage layered security to prevent ransomware attack
Important elements of a layer security approach
What to do if ransomware attack evades the initial layer
Risks of vulnerable or unprotected system
Organization’s recourse for getting back to production are restoring from backup or paying the ransom
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”AlienVault
Despite significant investments in the latest preventative security technologies, organizations continue to suffer devastating security breaches. And, attacks are not limited to just the big companies, smaller organizations are facing the same threats. If even the largest companies are struggling to avoid breaches, how can smaller teams with more limited security staff and budgets hope to avoid that same fate?
Join Fran Howarth of Bloor Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:
Developments in the threat landscape driving a shift from preventative to detective controls
Essential security controls needed to defend against modern threats
Fundamentals for evaluating a security approach that will work for you
How a unified approach to security visibility can improve threat detection
Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches
Is your IT security team suffering from alert fatigue? For many organizations, chasing down every security alert can tax an already overburdened IT department, often resulting in a breach that might have been avoided. Adding to this challenge is an increase in sophisticated threats that strike so fast and frequently, traditional methods of investigation and response can’t offer adequate protection.
A new webcast from CrowdStrike, “Proactive Threat Hunting: Game-Changing Endpoint Protection Above and Beyond Alerting,” discusses why so many organizations are vulnerable to unseen threats and alert fatigue, and why having an approach that is both reactive and proactive is key. You’ll also learn about Falcon OverWatch™, CrowdStrike’s proactive threat hunting service that investigates and responds to threats immediately, dramatically increasing your ability to react before a damaging breach occurs.
Download the webcast slides to learn:
--How constantly reacting to alerts prevents you from getting ahead of the potentially damaging threats designed to bypass standard endpoint security
--Why an approach that includes proactive threat hunting, sometimes called Managed Detection and Response, is key to increasing protection against new and advanced threats
--How CrowdStrike Falcon OverWatch can provide 24/7 managed threat hunting, augmenting your security efforts with a team of cyber intrusion detection analysts and investigators who proactively identify and prioritize incidents before they become damaging breaches
This talk will include an overview and demo of the Open Threat Exchange (OTX) and describe some of its information sources, including anonymous sharing from Open Source Security Information Management (OSSIM.) Jaime will share some of his experiences using OTX as a security researcher. He will also provide his thoughts on how OWASP members can benefit from security research and threat intelligence to "build in" security rather than constantly reacting.
State of Endpoint Security: The Buyers MindsetCrowdStrike
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers?
As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy – from enhancing efficacy to reducing complexity and agent bloat. A new webcast, “State of the Endpoint: The Buyer Mindset,” discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss today’s most important security issues. Join them as they explore the findings from a new research report, “Trends in Endpoint Security: A State of Constant Change,” a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward.
Join this webcast to learn:
-The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why
-Best of breed vs. comprehensive suites – which approach do your peers prefer and what are the advantages and challenges of each?
-How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
Your agents are fatigued and overwhelmed from fighting rogue attacks, and tailing covert ghost alerts. Meanwhile, the backdoor to your organization has been blown wide-open and cyber attackers are stealing the crown jewels. You need help.
From this mission:
• Uncover how to mitigate ghost alerts and empower your agents to focus on more important security priorities
• Leverage your current security investments-- instead of replacing them
• Learn how automation reduces the need for manual investigation and response
Data Protection becomes increasingly important, especially in the digital world. Data Protection by Design and by Default (“DPbDD”) plays a critical role in this connection and has been enshrined in Article 25 the EU General Data Protection Regulation (“GDPR”). Data Protection by Design requires that data protection principles are to be taken into consideration at the earliest stage of the design process, while Data Protection by Default should ensure that, by default, only personal data that are necessary for each purpose of the processing are processed.
Even though Article 25 GDPR specifically addresses data controllers (e.g. companies or public administrations using software for processing personal data), developers may find it useful to get familiar with DPbDD requirements for creating GDPR compliant software that enables data controllers to fulfill their data protection obligations. This could possibly lead to competitive advantages over competitors who do not design their products with data protection principles in mind.
Drawing from CrowdStrike's work, Cayce Beames will present evolving cybersecurity threats, discussed her thoughts on why traditional security is failing and shared a bit on what this "next generation endpoint protection" is about.
Cayce has been working in technology for over 25 years. From IT Systems Administration to Network Engineering and Internet Security, Risk Management and Compliance Auditing, Cayce has consulted with many Global corporations and traveled extensively. Cayce is currently a governance, risk and compliance analyst at CrowdStrike and founder of the not for profit, public benefit, education for kids organization called "The Computer Club" where she works to inspire kids and adults to address their fear of the unknown and make something awesome with technology.
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
With recent attacks on hospital data catching headlines, we wanted to provide some best practices in this webinar to keep your systems safe and sound! We will be co-presenting this webinar with our partners at Intellisuite IT Solutions.
What you will learn:
How-to use an Intranet to educate staff on IT security
How-to Engage staff in pro-active thinking about IT and patient privacy with a social Intranet tools.
How a proactive IT plan and an Intranet can help keep an organization safe from Ransomware Attacks
How-to publish and ensure readership on HITECH, HIPPA and other IT policies across the entire hospital using a web based Policy Manager
How an Intranet can alert staff of an attack and train staff on ways to prevent attacks
How to leverage layered security to prevent ransomware attack
Important elements of a layer security approach
What to do if ransomware attack evades the initial layer
Risks of vulnerable or unprotected system
Organization’s recourse for getting back to production are restoring from backup or paying the ransom
The Business Benefits of Threat Intelligence WebinarThreatConnect
The Businees Benefits of Threat Intelligence
Take 30 minutes of your time to hear Cyber Squared Inc. CEO Adam Vincent review the need for businesses to evaluate the cost of a sophisticated threat intelligence program. Learn more about the ROI calculator that evaluates cost/benefits of threat intelligence investments and offers quantifiable financial benefits and use-cases to demonstrate the overall costs associated with data breaches, and how using threat intelligence can decrease those costs and make existing staff more efficient.
Watch the full webinar here: https://attendee.gotowebinar.com/recording/7218699913172089858
Machine learning is a powerful tool with many well-suited applications for malware detection, classification, and risk quantification. Despite its reputation as a "black box" component to an enterprise security solution, designing a robust machine learning model for malware detection is an involved process: its success hinges on understanding the problem you're trying to solve, the underlying data you utilize, and most importantly, its limitations.
In this Malware Most Wanted session, we analyze working models discuss the strengths, pitfalls, and high-level trade-offs of using machine learning for successful malware detection.
Medical Device Threat Modeling with TemplatesPriyanka Aash
Modern medical devices contain many software components and are growing exponentially in complexity. Medical device engineering has typically struggled to threat model while the practice has become standard procedure for software systems. To help solve the problem for their engineers, GE Healthcare created a template that combines the software and medical device threat modeling specifics together.
Learning Objectives:
1: Understand the unique and common aspects of medical device technology.
2: See how to use a medical device threat model template.
3: Learn how the model presented may apply in any IoT environment.
(Source: RSA Conference USA 2018)
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat Sharing; Sara Terp and John Gray, Credibility Coalition Misinfosec Working Group
Uncovering ICS Threat Activity Groups for Intelligence-Driven Defense: Dragos has released information about eight threat activity groups that have targeted industrial companies. These groups range from espionage, to learning industrial environments for future effects, to causing a power outage and targeting human life directly. But what are threat activity groups? They are different than what is normally tracked in the community as threat actors and have a different focus for defenders.
Cybersecurity: How to Use What We Already Knowjxyz
Slides from my PSR keynote on how to secure software by bridging the gap between research and practice.
Video: https://t.co/mRr4CMrfKN
Event: https://iapp.org/conference/privacy-security-risk-2015
Don’t let Ransomware hold your data and your company hostage. Ransomware attacks increased by over 300% in 2016. Watch this Tech Demo to see how Unitrends addresses this prolific threat.
Exploring the Capabilities and Economics of CybercrimeCylance
In this talk we will look at the current attacker community as well as the tactics and capabilities that are currently being leveraged against targets across the globe. We will then go into the financial mechanics behind both financial based cybercrime as well as nationstate espionage. We will touch on some of the scary capabilities of attackers and try to work thru the reason why we still aren’t seeing the broad scale destructive attacks that everyone has been predicting for years.
By Jim Walter, Senior Research Scientist, Cylance
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
Explore the legal parameters of implementing an insider threat program, including the application of employee monitoring tools. Learn how to protect your corporate assets while respecting the privacy of your employees.
Employee monitoring rules – who, what, when, where, how and why
Employee privacy rights
Lawful employee screening procedures
Employee investigation rules
About Presenter
Shawn Thompson, J.D.
Over 15 years’ experience investigating, prosecuting, and managing insider threats.
Senior Litigation Attorney, Department of Defense
Insider Threat Program Manager, Department of Defense
Assistant General Counsel, Federal Bureau of Investigation
Board Member, National Insider Threat Special Interest Group
Special Assistant United States Attorney, United States Department of Justice
Vice President, Enterprise Security Risk Management, InfoTeK Corporation
Speaker at the IDC IT Security Roadshow 2017 in Doha. It was a one day event bringing together some Security Vendors and End User folks to present and discuss security related topics. The event midway was split into two tracks A - Threat Intelligence and B - Securing the Endpoint to the cloud. My End User Presentation (Track A) covered Threat Intelligence. There were some some interesting speakers and audience Q & A discussions followed by a networking lunch to boot. The venue at the Shangri La Hotel in Doha provided a great space and good networking opportunity.
6 Steps for Operationalizing Threat IntelligenceSirius
The best form of defense against cyber attacks and those who perpetrate them is to know about them. Collaborative defense has become critical to IT security, and sharing threat intelligence is a force multiplier. But for many organizations, good quality intelligence is hard to come by.
Commercial threat intelligence technology and services can help enterprises arm themselves with the strategic, tactical and operational insights they need to identify and respond to global threat activity, and integrate intelligence into their security programs.
Threat intelligence sources have varying levels of relevance and context, and there are concerns about data quality and redundancy, shelf life, public/private data sharing, and threat intelligence standards. However, if processed and applied properly, threat intelligence provides a way for organizations to get the insight they need into attackers’ plans, prioritize and respond to threats, shorten the time between attack and detection, and focus staff efforts and decision-making.
View to learn:
--The difference between threat information and threat intelligence.
--Available sources of intelligence and how to determine if they apply to your business.
--Key steps for preparing to ingest threat information and turn it into intelligence.
--How to derive useful data that helps you achieve your business goals.
--Tools that are available to make collaboration easier.
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
Dragos discusses the quickly rising tensions between the US, Russia, and Iran, threat intelligence on malicious activity surrounding these tensions, and recommended responses to defend industrial control systems and critical infrastructure worldwide.
Presentations included from Dragos Threat Intelligence following these threats and the Dragos Threat Operations Center currently responding and defending against these threats.
Visit www.dragos.com for more info about industrial cybersecurity
Check out these slides from SpiceWorld London that talk about debuzzing network security! Sometimes we get so caught up using buzzwords that we lose the point of the whole solution, we don’t want that to be the case for our new online security solution and we need the SpiceHeads to help! Be the first to see our totally new solution and help us to shape the future of a tool that gives you the power to manage your network security like large enterprises, at a fraction of the price and time commitment.
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskEC-Council
Richard is a security executive with ~20 years experience ranging from start-ups to global organizations. He is currently the CISO/VP of Trust for Twilio and most recently the VP/GM Cybersecurity and Privacy for GE Healthcare. His background is in Information Security, Digital Risk Management and Product Development with an analytics bent. His current focus is developing quantitatively informed strategies, building agile teams that scale and making digital risk measurable. Likewise, he recently co-authored a decision analysis book called “How To Measure Anything In Cybersecurity Risk” (Wiley 2016) This book targets those looking to improve risk management strategies using predictive analytics.
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
Crowdstrike And Guest Forrester Share Keys To Mastering The Endpoint
CrowdStrike VP, Product Management Rod Murchison and guest speaker Chris Sherman, Forrester Research analyst, will discuss how modern approaches must balance prevention with detection capabilities in the context of an overall security strategy. Ultimately, this will give security professionals the ability to better deal with the influx of new device types and data access requirements while reducing the likelihood of compromise.
In this CrowdCast, Forrester and CrowdStrike will present:
- Forrester’s Targeted-Attack Hierarchy of Needs
- The six core requirements to a successful endpoint security strategy
- Preparing for and responding to targeted intrusions and attacks
- How CrowdStrike lines up with Forrester’s Hierarchy of Needs framework
Threat Intelligence is a Journey; Not a DestinationThreatConnect
In this presentation we will go over the processes that go into threat intelligence. As well as the journey that threat intelligence is. Learn the value, return on investment and/or compelling impact that Threat Intelligence brings to an organization.
The Business Benefits of Threat Intelligence WebinarThreatConnect
The Businees Benefits of Threat Intelligence
Take 30 minutes of your time to hear Cyber Squared Inc. CEO Adam Vincent review the need for businesses to evaluate the cost of a sophisticated threat intelligence program. Learn more about the ROI calculator that evaluates cost/benefits of threat intelligence investments and offers quantifiable financial benefits and use-cases to demonstrate the overall costs associated with data breaches, and how using threat intelligence can decrease those costs and make existing staff more efficient.
Watch the full webinar here: https://attendee.gotowebinar.com/recording/7218699913172089858
Machine learning is a powerful tool with many well-suited applications for malware detection, classification, and risk quantification. Despite its reputation as a "black box" component to an enterprise security solution, designing a robust machine learning model for malware detection is an involved process: its success hinges on understanding the problem you're trying to solve, the underlying data you utilize, and most importantly, its limitations.
In this Malware Most Wanted session, we analyze working models discuss the strengths, pitfalls, and high-level trade-offs of using machine learning for successful malware detection.
Medical Device Threat Modeling with TemplatesPriyanka Aash
Modern medical devices contain many software components and are growing exponentially in complexity. Medical device engineering has typically struggled to threat model while the practice has become standard procedure for software systems. To help solve the problem for their engineers, GE Healthcare created a template that combines the software and medical device threat modeling specifics together.
Learning Objectives:
1: Understand the unique and common aspects of medical device technology.
2: See how to use a medical device threat model template.
3: Learn how the model presented may apply in any IoT environment.
(Source: RSA Conference USA 2018)
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat Sharing; Sara Terp and John Gray, Credibility Coalition Misinfosec Working Group
Uncovering ICS Threat Activity Groups for Intelligence-Driven Defense: Dragos has released information about eight threat activity groups that have targeted industrial companies. These groups range from espionage, to learning industrial environments for future effects, to causing a power outage and targeting human life directly. But what are threat activity groups? They are different than what is normally tracked in the community as threat actors and have a different focus for defenders.
Cybersecurity: How to Use What We Already Knowjxyz
Slides from my PSR keynote on how to secure software by bridging the gap between research and practice.
Video: https://t.co/mRr4CMrfKN
Event: https://iapp.org/conference/privacy-security-risk-2015
Don’t let Ransomware hold your data and your company hostage. Ransomware attacks increased by over 300% in 2016. Watch this Tech Demo to see how Unitrends addresses this prolific threat.
Exploring the Capabilities and Economics of CybercrimeCylance
In this talk we will look at the current attacker community as well as the tactics and capabilities that are currently being leveraged against targets across the globe. We will then go into the financial mechanics behind both financial based cybercrime as well as nationstate espionage. We will touch on some of the scary capabilities of attackers and try to work thru the reason why we still aren’t seeing the broad scale destructive attacks that everyone has been predicting for years.
By Jim Walter, Senior Research Scientist, Cylance
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
Explore the legal parameters of implementing an insider threat program, including the application of employee monitoring tools. Learn how to protect your corporate assets while respecting the privacy of your employees.
Employee monitoring rules – who, what, when, where, how and why
Employee privacy rights
Lawful employee screening procedures
Employee investigation rules
About Presenter
Shawn Thompson, J.D.
Over 15 years’ experience investigating, prosecuting, and managing insider threats.
Senior Litigation Attorney, Department of Defense
Insider Threat Program Manager, Department of Defense
Assistant General Counsel, Federal Bureau of Investigation
Board Member, National Insider Threat Special Interest Group
Special Assistant United States Attorney, United States Department of Justice
Vice President, Enterprise Security Risk Management, InfoTeK Corporation
Speaker at the IDC IT Security Roadshow 2017 in Doha. It was a one day event bringing together some Security Vendors and End User folks to present and discuss security related topics. The event midway was split into two tracks A - Threat Intelligence and B - Securing the Endpoint to the cloud. My End User Presentation (Track A) covered Threat Intelligence. There were some some interesting speakers and audience Q & A discussions followed by a networking lunch to boot. The venue at the Shangri La Hotel in Doha provided a great space and good networking opportunity.
6 Steps for Operationalizing Threat IntelligenceSirius
The best form of defense against cyber attacks and those who perpetrate them is to know about them. Collaborative defense has become critical to IT security, and sharing threat intelligence is a force multiplier. But for many organizations, good quality intelligence is hard to come by.
Commercial threat intelligence technology and services can help enterprises arm themselves with the strategic, tactical and operational insights they need to identify and respond to global threat activity, and integrate intelligence into their security programs.
Threat intelligence sources have varying levels of relevance and context, and there are concerns about data quality and redundancy, shelf life, public/private data sharing, and threat intelligence standards. However, if processed and applied properly, threat intelligence provides a way for organizations to get the insight they need into attackers’ plans, prioritize and respond to threats, shorten the time between attack and detection, and focus staff efforts and decision-making.
View to learn:
--The difference between threat information and threat intelligence.
--Available sources of intelligence and how to determine if they apply to your business.
--Key steps for preparing to ingest threat information and turn it into intelligence.
--How to derive useful data that helps you achieve your business goals.
--Tools that are available to make collaboration easier.
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
Dragos discusses the quickly rising tensions between the US, Russia, and Iran, threat intelligence on malicious activity surrounding these tensions, and recommended responses to defend industrial control systems and critical infrastructure worldwide.
Presentations included from Dragos Threat Intelligence following these threats and the Dragos Threat Operations Center currently responding and defending against these threats.
Visit www.dragos.com for more info about industrial cybersecurity
Check out these slides from SpiceWorld London that talk about debuzzing network security! Sometimes we get so caught up using buzzwords that we lose the point of the whole solution, we don’t want that to be the case for our new online security solution and we need the SpiceHeads to help! Be the first to see our totally new solution and help us to shape the future of a tool that gives you the power to manage your network security like large enterprises, at a fraction of the price and time commitment.
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskEC-Council
Richard is a security executive with ~20 years experience ranging from start-ups to global organizations. He is currently the CISO/VP of Trust for Twilio and most recently the VP/GM Cybersecurity and Privacy for GE Healthcare. His background is in Information Security, Digital Risk Management and Product Development with an analytics bent. His current focus is developing quantitatively informed strategies, building agile teams that scale and making digital risk measurable. Likewise, he recently co-authored a decision analysis book called “How To Measure Anything In Cybersecurity Risk” (Wiley 2016) This book targets those looking to improve risk management strategies using predictive analytics.
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
Crowdstrike And Guest Forrester Share Keys To Mastering The Endpoint
CrowdStrike VP, Product Management Rod Murchison and guest speaker Chris Sherman, Forrester Research analyst, will discuss how modern approaches must balance prevention with detection capabilities in the context of an overall security strategy. Ultimately, this will give security professionals the ability to better deal with the influx of new device types and data access requirements while reducing the likelihood of compromise.
In this CrowdCast, Forrester and CrowdStrike will present:
- Forrester’s Targeted-Attack Hierarchy of Needs
- The six core requirements to a successful endpoint security strategy
- Preparing for and responding to targeted intrusions and attacks
- How CrowdStrike lines up with Forrester’s Hierarchy of Needs framework
Threat Intelligence is a Journey; Not a DestinationThreatConnect
In this presentation we will go over the processes that go into threat intelligence. As well as the journey that threat intelligence is. Learn the value, return on investment and/or compelling impact that Threat Intelligence brings to an organization.
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
Answering the question of what threat intelligence is compared to threat data. Is it better to build or buy a solution? Who benefits? Steve presents on how to get started and what you'll need to do to best protect your organization against malicious attackers.
By Steve Mancini, Senior Director of Security, Cylance
Cyber threat intelligence: maturity and metricsMark Arena
From SANS Cyber Threat Intelligence Summit 2016. What are the characteristics of a mature cyber threat intelligence program, and how do you develop meaningful metrics? Traditionally, intelligence has been about providing decision
support to executives whilst the field of cyber threat intelligence supports this customer, and network defenders, who have different requirements. By using the intelligence cycle, this talk will
seek to help attendees understand how they can identify what a mature intelligence program looks like and the steps to take their program to the next level.
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
View Webinar: http://ibm.co/1pyzpuI
The momentum continues with the IBM Security AppExchange. Join this webinar to meet the developers of two apps that help you extend the capabilities of IBM Security QRadar.
iSIGHT Threatscape enables users to pull rich threat intelligence from iSIGHT Partners directly into QRadar, improving the ability to mange threats and automate security workflow.
STEALTHbits monitors Microsoft systems and provides an easy and extensible dashboard for viewing active-directory changes logged by STEALTHbits products
Learn the advantages of sharing best practices and collaborating with others to battle highly organized cybercrime - join the era of collaborative defense!
How to Build and Validate Ransomware Attack Detections (Secure360)Scott Sutherland
Ransomware is a strategy for adversaries to make money – a strategy that’s proven successful. During this presentation, we will cover how ransomware works, ransomware trends to watch, best practices for prevention, and more. At the core of the discussion, Scott will explain how to build detections for common tactics, techniques, and procedures (TTPs) used by ransomware families and how to validate they work, ongoing, as part of the larger security program. Participants will leave this webinar with actionable advice to ensure their organization is more resilient to ever-evolving ransomware attacks.
How to Simplify Audit Compliance with Unified Security ManagementAlienVault
Maintaining, verifying, and demonstrating compliance with regulatory requirements, whether PCI DSS, HIPAA, GLBA or others, is far from a trivial exercise. Proving compliance with these requirements often translates into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, remediating critical vulnerabilities, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools to assemble the security controls and reports you need. Compliance doesn't have to be so hard.
Review this presentation to learn:
- Common audit compliance failures
- A pre-audit checklist to help you plan and prepare
- Core security capabilities needed to demonstrate compliance
- How to simplify compliance with a unified approach to security
The Small Business Cyber Security Best Practice GuideInspiring Women
Cyber security is a big problem for small business.
Small business is the target of 43% of all
cybercrimes.
• 60% of small businesses who experience a
significant cyber breach go out of business within the
following
6 months.
• 22% of small businesses that were breached by the
2017 Ransomware attacks were so affected they could
not continue operating.
• 33% of businesses with fewer than 100 employees
don’t take proactive measures against cyber security
breaches.
• 87% of small businesses believe their business is
safe from cyberattacks because they use antivirus
software alone.
• Cybercrime costs the Australian economy more than
$1bn annually.
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
Cyberattacks against small and midsize organizations have increased from 11 percent to 15 percent in 2020, according to an Avast survey. Nonprofits are no exception to this alarming trend, which results in lost productivity, damaged reputations, and serious financial implications. Whether you’re a one-person IT team or a nontechnical concerned stakeholder, this webinar will help you
- Protect your organization from common malware attacks
- Set up a strong cybersecurity strategy for your organization
- Identify solutions to help minimize cyberattack risks
Endpoints are everywhere, and endpoint security is evolving. Endpoints also remain the most attractive target for hackers as a point of entry for attacks because they’re connected to the weakest link in enterprise data protection: humans.
View the SlideShare to learn:
--Why evolving threats require increased endpoint defense capabilities.
--What organizations can do to protect against known and unknown threats, while reducing manual processes for administrators.
--The primary capabilities of endpoint detection and response (EDR) tools, and how you can find the right fit for your business.
--Where your organization sits on the endpoint security maturity scale.
--Keys to maturing your endpoint security strategy.
A new generation of products and services is helping organizations keep pace with modern threats and advance beyond traditional, prevention-oriented endpoint protection to a more comprehensive — and realistic — focus on detection and incident response.
NIST Cybersecurity Framework is a good starting point for many enterprises to harden their security posture against advanced threats. In this webinar, we will share the major take-aways from the framework. More importantly, we will explain the 5 critical factors in implementing cybersecurity defense, and how to handle them with best practice.
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.
Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified Security Management (USM) can help you mitigate these threats.
You'll learn:
What the AlienVault Labs security research team has learned about these threats
How to scan your environment (cloud and on-premises) for the vulnerability with AlienVault USM Anywhere
How built-in intrusion detection capabilities of USM Anywhere can detect exploits of these vulnerabilities
How the incident response capabilities in USM Anywhere can help you mitigate attacks
Watch the On-Demand Webcast here: https://www.alienvault.com/resource-center/webcasts/meltdown-and-spectre-how-to-detect-the-vulnerabilities-and-exploits?utm_medium=Social&utm_source=SlideShare&utm_content=meltdown-spectre-webcast
Hosted By
Sacha Dawes
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
Watch this on-demand webast to learn how to acheive security compliance with AlienVault Unified Security Management (USM): https://www.alienvault.com/resource-center/webcasts/how-to-solve-your-top-it-security-reporting-challenges-with-alienvault?utm_medium=Social&utm_source=SlideShare&utm_campaign=solve-it-compliance-usm-webinar
Learn how you can take your on-premises and cloud security to the next level with a free online demo at: https://www.alienvault.com/products/usm-anywhere/demo?utm_medium=Social&utm_source=SlideShare&utm_campaign=solve-it-compliance-usm-webinar
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
Need a crash course on SIEM? No problem. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly.
You'll learn everything you need to know about:
* Critical information stored in your logs and how to leverage it for better security
*Requirements to effectively perform log collection, log management, and log correlation
*How to integrate multiple data sources
*What features to look for in a SIEM solution
AlienVault Threat Alerts are a simple yet powerful tool that comes built-in with Spiceworks. When a device on your network has been interacting with a known malicious host or suspicious IP, you’ll immediately get an alert in your feed and you’ll get an alert email.
Open Source IDS Tools: A Beginner's GuideAlienVault
This SlideShare provides an overview of the various Open Source IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some great open source intrusion detection (IDS) tools available to you.
Security operations center 5 security controlsAlienVault
An effective Security Operation Center provides the information necessary for organizations to efficiently detect threats and subsequently contain them. While eliminating the threats we face is an impossible goal, reducing the time it takes to respond and contain them is certainly achievable. Learn 5 security controls for an effective security operations center.
PCI DSS Implementation: A Five Step GuideAlienVault
Payment Card Industry Data Security Standard (PCI DSS) compliance can be both hard and expensive. For most small to medium sized organizations, it doesn’t have to be as long you have the right plan and tools in place. In this guide you’ll learn five steps that you can take to implement and maintain PCI DSS compliance at your organization.
AlienVault PCI DSS Compliance:
https://www.alienvault.com/solutions/pci-dss-compliance
Have a question? Ask it in our forum:
http://forums.alienvault.com
More videos: http://www.youtube.com/user/alienvaulttv
AlienVault Blogs: http://www.alienvault.com/blogs
AlienVault: http://www.alienvault.com
Improve threat detection with hids and alien vault usmAlienVault
Host-based intrusion dection systems (HIDS) work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM integrates HIDS with other key security controls to help you get the most out of HIDS, including:
Analyzing system behavior and configuration status to track user access and activity
Detecting system compromise, modification of critical configuration files (e.g. registry settings, /etc/passwd), common rootkits, and rogue processes
Correlating HIDS data with known IP reputation, vulnerability scans and more
Logging and reporting for PCI compliance
The State of Incident Response - INFOGRAPHICAlienVault
Incident Response (IR) teams are designed to detect, investigate and, when necessary, perform remediation in the event of a critical incident. The results of the 2015 SANS Incident Response Survey provides a picture of what IR teams are up against today—the types of attacks they see, what defenses they have in place to detect and respond to these threats, and their perceived effectiveness and obstacles to incident handling.
Some key challenges reported by responders to the survey were:
66% cited a skills shortage as being an impediment to effective IR:
54% cited budgetary shortages for tools and technology
45% noted lack of visibility into system or domain events
41% noted a lack of procedural reviews and practice
37% have trouble distinguishing malicious events from nonevents
Do these challenges sound familiar? Download the full survey to learn more about how other organizations are approaching incident response, along with best practices and advice. Visit http://ow.ly/R3Cr0
Incident response live demo slides finalAlienVault
So, you've got an alarm - or 400 alarms maybe, now what? Security incident investigations can take many paths leading to incident response, a false positive or something else entirely. Join this webcast to see security experts from AlienVault and Castra Consulting work on real security events (well, real at one point), and perform real investigations, using AlienVault USM as the investigative tool. Process or art form? Yes.
You'll learn:
Tips for assessing context for the investigation
How to spend your time doing the right things
How to to classify alarms, rule out false positives and improve tuning
The value of documentation for effective incident response and security controls
How to speed security incident investigation and response with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
Securing your network from threats is a constantly evolving challenge, especially for federal government agencies with much valuable data to protect, and where IT security resources are often limited. AlienVault has helped many government organizations get complete security visbility for effective threat detection and response, without breaking the bank.
Join us for a live demo to see how AlienVault USM addresses these key IT security needs:
Discover all IP-enabled assets to get an accurate picture of attack surface
Identify vulnerabilities like insecure configurations and unpatched software
Improve situational awareness with real-time threat detection and alerting
Speed incident containment & response with built-in remediation guidance for every alert
Investigate anomalies in protocol usage, privilege escalation, host behavior and more
Generate fast & accurate reports for compliance & management
Improve Security Visibility with AlienVault USM Correlation DirectivesAlienVault
At the heart of SIEM is ability to correlate events from one or many sources into actionable alarms based on your security policies. AlienVault USM provides over 2100 correlation directives developed by the AlienVault Labs team, plus the ability to create your own custom rules.
Join us for this customer training session covering how to:
Ensure you are using the latest and greatest built-in correlation directives from AlienVault Labs
Write your own correlation directives based on events from one or more sources
Turn correlation information into actionable alarms
Use correlations to enforce your security policies
With malware accounting for at least 40% of all breaches, knowing how malware works can be an extremely valuable asset in your threat detection cache – especially for the incident responder. According to Verizon’s 2013 Data Breach Investigations Report, “Malware and hacking still rank as the most common [threat] actions”. In general, malware can range from being simple annoyances like pop-up advertising to causing serious damage like stealing passwords and data or infecting other machines on the network.
Malware is as old as software itself and although there are new types of malware constantly under development, they generally fall into a few broad categories. Check out this SlideShare to learn how malware works, and what we believe are the most common types of malware you should be prepared for.
By learning how malware works and recognizing its different types, you’ll understand:
- How they find their way into your network
- How attackers control them remotely
- How they use your systems for nefarious purposes
- And most importantly, the security controls you need to effectively defend against and detect malware infections. (Hint: you need more than antivirus!)
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
AlienVault Unified Security Management™ (USM) integrates SIEM/event correlation with built-in tools for intrusion detection, asset discovery, vulnerability assessment and behavioral monitoring to give you a unified, real-time view of threats in your environment. NEW v5.0 (available 4/20) makes it faster and easier than ever to get the insights you need, starting on Day 1.
Join us for a live demo to see how new USM v5.0 makes it easier than ever to accomplish these key tasks:
Discover all IP-enabled assets on your network
Identify vulnerabilities like unpatched software or insecure configurations
Detect network scans and malware like botnets, trojans & rootkits
Speed incident response with built-in remediation guidance for every alert
Generate accurate compliance reports for PCI DSS, HIPAA and more
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than EverAlienVault
With a focus on simplifying asset management, OSSIM v5.0 (available 4/20) makes it faster and easier than ever to get the insights you need. Join us for this user training to learn how to get the most out of these new enhancements:
Assign custom labels for assets, groups and networks
Search, filter and group assets by OS, IP address, device type, custom labels and more
Run vulnerability and asset scans on custom asset groups with one click
Filter by asset groups in alarms, security events and raw logs
Update configuration, sensor assignment, asset value and more on multiple assets and groups of assets at once
...and more!
AWS Security Best Practices for Effective Threat Detection & ResponseAlienVault
In this SlideShare, we’ll share the AWS Security Best Practices for securing AWS environments, as well as some of the trends our research has shown with regard to attacks on those environments. We'll also introduce the key capabilities needed for a modern threat detection & incident response program customized for AWS, and other AWS Security Best Practices including:
-Asset Discovery - creating an inventory of running instances
-Vulnerability Assessment - conducting scans to assess exposure to attack, and prioritize risks
-Change Management - detect changes in your AWS environment and insecure network access control configurations
-S3 & ELB Access Log Monitoring - Monitor access logs of hosted content and data directed at your instance
-CloudTrail Monitoring and Alerting - Monitor the CloudTrail service for abnormal behavior
-Windows Event Monitoring - Analyze system level behavior to detect advanced threats
With more IT environments moving data and applications to AWS, the motivation for hackers to target AWS environments is also increasing. We believe these AWS Security Best Practices will be a valuable addition to every security practitioner’s playbook.
We'll finish up with a demo of NEW AlienVault USM for AWS, which delivers all of the above capabilities, plus log management & event correlation to help you detect threats quickly and comply with regulatory requirements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
3. @AlienVault
What is Threat Intelligence?
Provides data that you did not already have
• Examples: reputation scoring, attack tools, threat actors
Provides data (or analysis of data) that helps you make more decisions
about defense
• Example: helping you figure out what else to look for, or what proactive
measures to take
Verizon Business VERIS taxonomy: includes both actor and action
Data sold separately; customer can decide how to apply it further
Platform or technology specifically for threat intel collection, analysis or
sharing
4.
5. @AlienVault
Threat Intelligence is …
Additive – made to be collected
Secretive – part of the value is that not everyone else knows it
Transitive – built on transitive trust relationships
Elusive – can quickly expire, degrade or dry up
8. @AlienVault
Questions to Ask When Evaluating Threat
Intelligence
Which indicators are being offered?
Where does the TI come from?
How is the TI generated?
How rich is the metadata?
Is the information useful to my organization?
Does it help detect incidents?
Does it help me when responding to an incident?
Does it help triaging?
Am I able to consume the data with the technologies/tools within my enterprise?
10. @AlienVault
The Power of the “Crowd” for Threat Detection
Cyber criminals are reusing the same
tactics to attack multiple targets.
Collaborative threat intelligence makes
us all more secure.
Identify, flag and block known
attackers
Update policies/alerts to detect
threats
Reduce the attacker’s ROI
17. @AlienVault
A Real-Time Threat Exchange framework
First Street
Credit Union
Alpha Insurance
Group
John Elway
Auto Nation
Regional Pacific
Telecom
Marginal Food
Products
Attack
Detect
Open Threat Exchange
Puts Preventative Response Measures in Place Through Shared Experience
18. @AlienVault
A Real-Time Threat Exchange framework
First Street
Credit Union
Alpha Insurance
Group
John Elway
Auto Nation
Regional Pacific
Telecom
Marginal Food
Products
Attack
Detect
Open Threat Exchange
Protects Others in the Network With the Preventative Response Measures
22. More Questions?
Tweet @AlienVault
NOW FOR SOME Q&A…
Join the Open Threat Exchange
http://www.alienvault.com/open-threat-exchange
Download a free 30-day trial of USM
http://www.alienvault.com/free-trial
Join us for a live demo
http://www.alienvault.com/marketing/alienvault-
usm-live-demo
@jaimeblascob @451Wendy
Editor's Notes
Need to add their photos
Q: Let’s talk first about threat intelligence in general. How is it different from, say, a list of bad IPs for you to block at the firewall>
Just about every security tool out there is claiming to include threat intelligence. If you have several of these products in-house, is that enough threat intelligence for the organization to get by?
If you’re CISO at a small- or medium-size organization, and you’re shopping for threat intelligence, how would you evaluate the offerings? (move to next slide after asking question)
Couldn’t an enterprise just subscribe to the same open source threat intelligence feeds that everyone else does? What more does collaborative threat-sharing bring to the table?
(then go to next slide)
Many threat-sharing groups are either ISACs (information sharing and analysis centers) or private groups where you have to know the right people to take part. How do SMBs get into the game?
How do enterprises make sure that they’re not exposing confidential information when they share threat intelligence?
Are large enterprises and small ones going to benefit from the same types of threat intelligence, or do they need different kinds?
How does AlienVault’s product help security staff consume threat intelligence?