dfm covers

SANS Institute To Host the Industry's First Cyber Threat Intelligence Summit

Print PDF
Tuesday, 26 February 2013 19:16 Written by DFM News

SANS Institute today announced it will host the industry's first cyber threat intelligence summit, March 22 in Washington, D.C. The What Works in Cyber Threat Intelligence Summit is a one-of-a-kind knowledge sharing event that brings together some of the industry's top security experts including those who pioneered the notion of using information about ones adversaries to improve an organization's computer network defense.

Cyber threat intelligence means knowing who your adversaries are, understanding what they know, and knowing what to do with this information once you have it. The goal of the summit is to help attendees learn more about the tools, methodologies and processes available so they can move forward and benefit from cyber threat intelligence.

"The stakes associated with a cyber attack are getting higher as our adversaries become increasingly smarter and more aggressive. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats," said Mike Cloppert, SANS Cyber Threat Intelligence lead and CIRT Chief Research Analyst with Lockheed Martin. "For those who are serious about cyber defense, this is a must attend event and a rare opportunity to learn from some of the best minds in security."

The keynote presentation will be delivered by Greg Rattray, Delta Risk LLC, (retired) 8th U.S. Air Force Colonel who coined the term "APT" and introduced many organizations to this domain. He will be joined by other top security professionals as they share lessons they have learned, including Rick Holland, Senior Analyst at Forrester Research, Shane Huntley, the Threat Analysis Group at Google, Aaron Wade, General Electric CIRT, Mike Gordon, the CIRT Senior Manager at Lockheed Martin, Richard Bejtlich, CSO from MANDIANT, Rocky DeStefano, Visible Risk, Adam Meyers, CrowdStrike, and John Ramsey from Dell SecureWorks.

Agenda highlights for the Cyber Threat Intelligence Summit will include:

?The Evolution of Cyber Threats and Cyber Threat Intelligence (keynote address)
?Best Practices in Creating, Delivering, and Utilizing Cyber Threat Intelligence for your Organization
?Building and Operating a Cyber Threat Intelligence Organization
?Creating Threat Intelligence: Tools to Manage and Leverage Active Threat Intelligence
?Expert CTI Solutions Panel: Delivering Actionable Cyber Threat Intelligence as a Solution

For more information on SANS' Cyber Threat Intelligence Summit including panel and discussion overviews and a complete list of industry presenters, or to register for the event, please visit: http://www.sans.org/info/125332

Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Hacking the Human

Full of ideas and angles that turn day-to-day security management on its head. Hacking the Human by Ian Mann.

Meet the Authors

Scott C. Zimmerman

Scott C. Zimmerman is a CISSP qualified Information Security consultant and presenter


Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 26 on sale from February 2016:

Penetration Testing Tutorials
Continuing his series of tutorial articles about penetration testing, Andy Swift sheds some light on some of the more interesting techniques, with a focus on techniques that can be combined with basic tools to take an ordinary attack that few steps further. Read More »

Recent Advances in Forensic Radiology
Forensic Radiology is a very specialized area of medical imaging utilizing radiological techniques to assist physicians and pathologists in matter pertaining to the law. This article describes all the recent advancements done till now in the field of forensic radiology.. Read More »

Subscribe today

Hunting with Honeypots
In this article, we explain how there is more to a good defence strategy than what most companies and vendors would qualify as a good defence strategy; it requires timely detection and dynamic deflection, as most companies take more than six months to discover a data breach, by which point a great deal of damage may already have been done. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue