The second annual SANS Cyber Threat Intelligence Summit & Training will be held in Arlington, VA, February 4-11. In preparation for this event, which is beginning to fill out with some really exciting content on collection, exploitation, and analytics of cyber threat intelligence, we would like to offer the public two in-depth examples of the type of information that will be shared with participants. Summit Co-Chair Mike Cloppert, CIRT Chief Research Analyst, Lockheed Martin, will lead off with the first webinar, which will examine the most frequently asked question about cyber threat intelligence: Now that I can get it, what do I do with it?
Gaining access to CTI is a necessary first step, but the process of vetting and leveraging it can feel somewhat overwhelming, particularly considering the volume of information that is available within some of the most prolifically-sharing industries like financial services and the defense industrial base (DIB). In this webinar, Cloppert will outline the steps network defenders must follow in order to successfully begin using CTI within their organization. The talk will begin with a brief outline of what CTI is, but the focus of this discussion will be on the ingestion, vetting, and deployment/exploitation of intelligence in furtherance of improved computer network defense. Front-line defenders/practitioners, and their immediate management alike, will want to see the steps successful organizations follow to improve the use of their CTI feeds. Methodology as well as requirements for enabling technologies will be discussed in this one-hour presentation.
Interested in more CTI? Register for the Cyber Threat Intelligence Summit taking place February 10-11, 2014 in Arlington, VA!
There are wide variety of threats that can impact your business. Enterprises need the skills, technology and processes to collect and analyze threat data and turn it into action to mitigate risks and elevate security. The Summit will bring together practitioners and experts to give you the knowledge you need to deal with the next wave of threats. View the current Summit agenda and register today.