Intelligent Intelligence: Secrets to Threat Intel Success

  • Webcast Aired Tuesday, 12 Jan 2016 3:00PM EST (12 Jan 2016 20:00 UTC)
  • Speaker: David Bianco

Those of us tasked with defending networks are lucky to live in a time when there is so much information floating around about our adversaries, their goals, techniques and tools. The sheer amount of information that's readily available, though, can present a problem of it's own: overload. From reports to indicator feeds to samples of malicious files, there's just so much raw data available that it's often not clear which pieces will have the most impact on our ability to resist our adversaries. Using them all indiscriminately leads to piles of ignored alerts, swamped analysts and undetected attacks. However, by making smart choices about which pieces of information we use, we can both reduce the burden on the defender and increase the cost of the adversary's attacks, making it harder for them to operate against us. Join us to hear about a smarter, goal-driven approach to using threat intelligence intelligently as we discuss 'secrets to Threat Intel Success '.


Learn more about secrets to threat intel success at the upcoming CTI Summit in Alexandria, VA February 3-4, 2016.

The fourth annual Cyber Threat Intelligence Summit brings experienced intelligence practitioners together - onstage and off - to feature contemporary theories, research, and tradecraft divided along tactical, operational, and strategic levels. By adopting this format change, with exciting keynotes to usher in each of the three sections, we hope to better frame the summit content so participants can immediately see where in their organizations each of the tools, methodologies, and processes can be applied as soon as they are back in the office.

  • Decrease your adversary's likelihood of success with each subsequent attempt.
  • Ensure your security programs are up-to-date to outsmart sophisticated attacks.
  • Obtain accurate and timely information to monitor new and evolving attacks.
  • Utilize this information to detect and ultimately avoid a security breach.