ThreatQuotient Team Set To Speak at 6 Events in October, Locally and Abroad
POSTED BY LIZ BUSHThreatQuotient is looking forward to a busy October, full of events taking place across the globe. In particular, we have team members that will be traveling to speak at six events this month, spanning from Colorado to Germany. Ranging from technical workshop style presentations to panels full of industry experts, the ThreatQuotient team will be speaking on a wide array of topics including security challenges facing the retail industry, the benefits of using threat intelligence and applying it to security operations, and new threats that require advances in encryption, automation and machine learning. To see all of the events ThreatQuotient is participating in during the month of October, head to our events page where you can also schedule time to meet with our team in person!
ThreatQuotient’s speakers, Jonathan Couch, Ryan Trost, Michel Huffaker and Chris Jacob, are looking forward to exchanging ideas and hope that you will join them for one or more of the events below!
FS-ISAC EMEA Summit 2018
When/Where: October 2, 2018 in Amsterdam, Netherlands
Speaker: Jonathan Couch, SVP of Strategy
Threat Mosaic – Using Cyber Threat Intelligence to improve collaboration & communication
Most organizations are now leveraging threat intelligence in one way or another. The question is whether they are using it the “right” way to make use of all their people, process and technology with an eye toward stakeholders. In this session, Jonathan Couch will walk through how a threat mosaic is created from security collaboration and how your threat knowledge base can be leveraged to communicate business-critical information to executives, the board, business units and other security teams.
Splunk .conf18
When/Where: October 2, 2018 in Orlando, Florida
Speaker: Chris Jacob, Global Vice President, Threat Intelligence Engineers
You do your job, and I’ll do mine! (and together we can do it all) – “Achieving synchrony across the enterprise security organization through passive collaboration”
In this presentation, Chris Jacob will discuss the implementation of machine to machine collaboration, and the establishment of an “Intelligence Funnel” to move the large data sets of a SOC, to the more targeted data sets of the incident response team, and finally to the extremely contextual data sets of the enforcement infrastructure.
R-CISC Summit 2018
When/Where: October 2, 2018 in Denver, Colorado
Speakers: Michel Huffaker, Director of Threat Intelligence Service, ThreatQuotient
Glen Jones, Head, Payment Systems Cyber Intelligence, Visa
Caitlin Icart, Sr. Manager, Cyber & Threat Intel, Best Buy
The Challenges and Impacts of Payment Security
In this panel, the speakers will be taking a deep dive into the effectiveness of threat management and breach detection given the recent advancements of payment security. How do these advancements shift the focus of adversary targeting and tactics? What’s the difference between artificial intelligence and threat intelligence when it applies to threat hunting and breach detection? Which approach has proven more effective in protecting payment networks? How do hackers conceal attacks to thwart current fraud detection? Listen as Michel Huffaker from ThreatQuotient, Glen Jones from Visa Threat Intelligence, and Caitlin Icart from Best Buy discuss these questions and many more that impact payment processors on a daily basis.
Borderless Cyber USA
When/Where: October 4, 2018 in Washington, D.C.
Speaker: Ryan Trost, CTO
Do You See Threat Intelligence as a ‘Friend’ or a ‘Foe’?
It is now becoming widely recognized that a mature threat intelligence program can greatly assist defenders in effectively deploying their precious and limited resources. However, creating and running a mature threat intelligence program is simultaneously often seen as often expensive to run, difficult to properly operationalize, and full of false positives if a lot of time and care is not spent on curation. There is also pushback on how intelligence programs take resources from the “block and tackle” aspects of cybersecurity – ie, when 90% of breaches originate from a simple phish or social engineering, focusing on threat intelligence is a distraction. How does the industry feel about the role of threat intelligence? This is your opportunity to ask those on the frontlines this important question. Several CTI experts, including Ryan Trost, will share their views on the ‘friend or foe’ question. They’ll also happy to answer other related CTI questions.
CyberMaryland Conference
When/Where: October 9, 2018 in Baltimore, Maryland
Speaker: Chris Jacob, Global Vice President, Threat Intelligence Engineers
Future Threats and Quantum Leaps in Encryption, Automation and Machine Learning
Until now, most have assumed encryption is enough to protect stolen data from compromise. Encryption standards have evolved over time as computing capabilities have advanced to crack older generations of code and we have always lived under the assurance that our latest encryption is strong enough to withstand the most formidable foe with almost unlimited resources. However, the newest quantum computer architectures have the future potential to break even the strongest encryption society relies on today. It is time to fight fire with fire and completely upgrade our approach considering quantum networks for encryption key exchange. Battelle, industry researchers and academics are identifying ways quantum networks can be used to protect future generations from having to worry about their encryption again. This panel, including Chris Jacob, will center around highlighting new threats that require advances in encryption, automation and machine learning.
it-sa 2018
When/Where: October 10, 2018 in Nuremberg, Germany
Speaker: Jonathan Couch, SVP of Strategy
Cyber Threat Intelligence: Hurricanes and Earthquakes
Security operations groups are facing a key change to how we implement cybersecurity: cyber threat intelligence (CTI) and threat intelligence management. While intelligence has been around for quite some time, the quality and quantity of CTI available to organizations, both commercial and government, is greater than it has ever been. The key, however, is to understand what CTI really is and how to best make it actionable within your environment.
Leveraging almost two decades of cyber threat intelligence experience to define cyber threat intelligence and intelligence-driven operations, this talk will walk through some global examples of how organizations have implemented CTI. The future of cyber security will be driven by a better understanding of the adversary, their motivation, intent, tactics, and infrastructure. The key question covered in this talk by Jonathan Couch is how organizations will need to adapt to make the most use of this knowledge within security operations.
0 Comments