dfm covers
 
 

SANS Institute To Host the Industry's First Cyber Threat Intelligence Summit

Print PDF
Tuesday, 26 February 2013 19:16 Written by DFM News

SANS Institute today announced it will host the industry's first cyber threat intelligence summit, March 22 in Washington, D.C. The What Works in Cyber Threat Intelligence Summit is a one-of-a-kind knowledge sharing event that brings together some of the industry's top security experts including those who pioneered the notion of using information about ones adversaries to improve an organization's computer network defense.

Cyber threat intelligence means knowing who your adversaries are, understanding what they know, and knowing what to do with this information once you have it. The goal of the summit is to help attendees learn more about the tools, methodologies and processes available so they can move forward and benefit from cyber threat intelligence.

"The stakes associated with a cyber attack are getting higher as our adversaries become increasingly smarter and more aggressive. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats," said Mike Cloppert, SANS Cyber Threat Intelligence lead and CIRT Chief Research Analyst with Lockheed Martin. "For those who are serious about cyber defense, this is a must attend event and a rare opportunity to learn from some of the best minds in security."

The keynote presentation will be delivered by Greg Rattray, Delta Risk LLC, (retired) 8th U.S. Air Force Colonel who coined the term "APT" and introduced many organizations to this domain. He will be joined by other top security professionals as they share lessons they have learned, including Rick Holland, Senior Analyst at Forrester Research, Shane Huntley, the Threat Analysis Group at Google, Aaron Wade, General Electric CIRT, Mike Gordon, the CIRT Senior Manager at Lockheed Martin, Richard Bejtlich, CSO from MANDIANT, Rocky DeStefano, Visible Risk, Adam Meyers, CrowdStrike, and John Ramsey from Dell SecureWorks.

Agenda highlights for the Cyber Threat Intelligence Summit will include:

?The Evolution of Cyber Threats and Cyber Threat Intelligence (keynote address)
?Best Practices in Creating, Delivering, and Utilizing Cyber Threat Intelligence for your Organization
?Building and Operating a Cyber Threat Intelligence Organization
?Creating Threat Intelligence: Tools to Manage and Leverage Active Threat Intelligence
?Expert CTI Solutions Panel: Delivering Actionable Cyber Threat Intelligence as a Solution

For more information on SANS' Cyber Threat Intelligence Summit including panel and discussion overviews and a complete list of industry presenters, or to register for the event, please visit: http://www.sans.org/info/125332


 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 33 on sale from November 2017:


Triage Solution for Sex Offender Managers

This article considers a proof of concept triage solution for sex offender managers for a local police force which if successful could simplify and modify the way that sex offenders are managed. Read More »

Advancements in Windows Hibernation File Forensics

Brian Gerdon looks at how the windows hibernation files can be a valuable source of information for digital forensic investigators. Read More »

Subscribe today


Why Are Cybercriminals Attracted To Commit Crimes

Individuals who engage in cybercrime have a psychological mindset that is attuned to it. This paper discusses the motives behind cybercrime and what makes cybercrime attractive to cybercriminals. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue