Practical and Open Source Threat Intelligence

  • Webcast Aired Tuesday, 17 May 2016 3:00PM EDT (17 May 2016 19:00 UTC)
  • Speaker: James Tarala

Threat actors are not magic and there is not an unlimited, unique list of threats for every organization. Enterprises face similar threats from similar threat sources and threat actors - so why does every organization need to perform completely unique risk assessments and prioritized control decisions? This presentation will show how specific, community driven threat models can be used to prioritize an organization's defenses - without all the confusion.

Industry pundits often present the idea that every organization and every industry is unique in their own special way. They present that enterprises need to hire specialists and subscribe to up to the minute threat intelligence to defend themselves against cyber-attack. While such commentary can be beneficial, the majority of attacks still take place using common methods and tools, exploiting weaknesses that can be found in any industry.

In this presentation attendees with learn about an open, community-driven threat model that can be used by any industry to evaluate the risk that faces them. Then they will learn how to practically use this model to prioritize enterprise defense and map to existing compliance requirements facing organizations today. Whether you are in the Department of Defense or work for a small mom and pop retailer, you will be able to use this model to specifically determine a prioritized defense for your organization.