Agenda

Monday, December 9, 2024

Navigating the Evolving Threat Intelligence Landscape and Organizational Responsibility

DESCRIPTION:

This keynote session will set the stage by exploring the complexities of establishing and operating an effective Cyber Threat Intelligence (CTI) program within organizations, examining how diverse organizational structures, priorities, and desired outcomes influence the role and integration of CTI. The discussion aims to provide insight into the varying practices and considerations that shape CTI success across organizations. Our panelists will cover:

  • The necessity of having dedicated CTI teams, optimal organizational structures, and strategies for overcoming silos or internal “political challenges” within security teams
  • The core functions of CTI teams, including situational awareness, risk integration, and best practices for new CTI programs
  • The essential tools, the role of commercial and open-source intelligence, and the potential outcomes of emerging technologies like AI on CTI practices

SPEAKERS: Shimon Modi, VP Product Management, Cyber (Dataminr), Sébastien Bombal, Technical Director – administrator of customs and indirect duties for the National Directorate of Customs Intelligence and Investigation (DNRED) and Rick McElroy, Founder CEO (NeXasure)

MODERATOR: Gigi Schumm, Chief Revenue Officer at ThreatQuotient

TRACK: Threat Intelligence Management

FORMAT: Panel Discussion

SPONSOR: Dataminr

Tuesday, December 10, 2024

Taking a Threat Adapted Approach to Vulnerability Management

DESCRIPTION:

This session will discuss a Threat Adapted Approach to Vulnerability Management. As cyber threats continue to grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands a dynamic, threat-adapted approach. This session will explore how integrating Threat Intelligence into Vulnerability Management can transform the way organizations prioritize and respond to risks. Our speakers will discuss topics including:

  • Integrating Threat Intelligence in Vulnerability Management, and the role that it plays
  • Building connections with business teams and application owners to improve the identification of high value assets (breaking down the silo)
  • Leveraging these relationships to communicate and escalate changing threats based on Threat Actor activity
  • Developing alternate mitigations and compensating controls when immediate patching is not an option

SPEAKERS: Will Baxter, Security Engineer (Team Cymru) and Tyler Howerton, Senior Intelligence Analyst (Major US Based Airline)

MODERATOR: Chris Jacob, VP of Threat Intelligence Engineering at ThreatQuotient

TRACK: Vulnerability Prioritization

FORMAT: Tech Talk / Demo

SPONSOR: Team Cymru

Wednesday, December 11, 2024

A Collaborative Approach to Cyber Threat Intelligence Sharing: Strategies, Challenges, and Best Practices

DESCRIPTION:

This session will highlight the significance of collaboration in cyber threat intelligence sharing, discussing strategies, challenges, and best practices to foster a cooperative approach to align with cybersecurity regulations. our experts will explore the following points in greater depth:

  • Compliance and regulations global landscape and critical role in cyber threat intelligence
  • Strategies for navigating Indicators of Compromise (IoC) process and decision-making
  • Strategies and best practices for fostering collaboration in the cyber threat intelligence community

SPEAKERS: Rebecca Gibergues, EMEA Executive Director (FS-ISAC) and Bence Horvath, Director – Cyber Resilience Services (CPX)

MODERATOR: Leon Ward, VP of Product Management at ThreatQuotient

TRACK: Threat Sharing

FORMAT: Use Case

Thursday, December 12, 2024

What Makes a Good Threat Intelligence Report

DESCRIPTION: 

In today’s rapidly evolving cyber threat landscape, the ability to effectively communicate threat intelligence is crucial for organizations aiming to stay ahead of potential risks. This session will provide a detailed analysis of what constitutes a high-quality threat intelligence report and how to make it an effective part of your cybersecurity strategy. Our experts will delve into:

  • Understanding when, why, and how these reports are essential to your organization
  • A breakdown of the different reports types, their specific purposes, and how they align with distinct security goals
  • The key elements of creating impactful reports
  • How can reports be effectively used to drive cybersecurity strategies

SPEAKERS: Gabi Reish, Chief Product & Business Development Officer (Cybersixgill) and Jérémy Couture, Head of SOC (Paris 2024)

MODERATOR: Yann Le Borgne, Technical Vice President for International at ThreatQuotient

TRACK: Reporting

FORMAT: Use Case

SPONSOR: Cybersixgill

Friday, December 13, 2024

Harnessing Collective Insight: Successes in Leveraging a Threat Intelligence Community

DESCRIPTION: 

The closing session will focus on the power of collective insight, showcasing success stories of organizations effectively leveraging a threat intelligence community for improved security outcomes.

In an era where cyber threats are becoming increasingly sophisticated and widespread, the power of collective insight has emerged as a vital tool in strengthening cybersecurity defenses. This closing session will focus on the significant advantages of participating in and leveraging a threat intelligence community. Our leaders will discuss:

  • Cybersecurity communities panorama and perspectives
  • Benefits of engaging with a threat intelligence community
  • How organizations can successfully integrate threat intelligence community insights into their cybersecurity programs
  • Results, lessons learned, and a visionary outlook on the future of collective intelligence in cybersecurity

SPEAKERS: John Barth, Senior Intelligence Enablement Consultant (Google Cloud), Aaron Bierlein, Threat Intelligence Manager (Deepseas, LLC) and Michael Daniel, President & CEO (Cyber Threat Alliance)

MODERATOR: Matt McCormick, SVP of Corporate and Business Development at ThreatQuotient

TRACK: Threat Intelligence Community

FORMAT: Panel Discussion

SPONSOR: Google Cloud