Threat Intelligence: Shift from a reactive to a proactive cybersecurity strategy

On-Demand Event

Earn up to 6.5 CPE credits by attending this virtual conference.

The volume, velocity and variety of threat alerts threaten to overwhelm many organizations’ cybersecurity defenses. Without knowing the severity of each warning, analysts and security operations teams often waste time chasing false alarms and, as a result, miss real and significant threats.

This is where an effective threat intelligence strategy can help — gathering information from a variety of sources to provide security teams with evidence-based knowledge, including context, implications, and advice about remediation. A strong approach to threat intelligence enables a cybersecurity team to proactively target the threats that matter most.

SC Media hosted the Threat Intelligence eSummit on December 8-9, with select industry professionals to help analysts and security operations teams:

  • Gain visibility into existing and emerging threats
  • Minimize risk of information loss and associated costs
  • Improve efficiency and effectiveness of incident response efforts

Register today to see how an effective threat intelligence strategy can minimize disruptions to your business operations.



DAY 1 – DECEMBER 8, 2021

11:00 AM ET
KEYNOTE | Revolutionary tactics: Rethinking system defenses 
Michael Coden, Managing Director, Boston Consulting Group 

Cybercriminals have amassed a fortune and now purchase zero-day vulnerabilities, while CISOs are limited to small percentage of the IT budget and the relentless dark cloud of ransomware threats. Tools help, but too often security teams recognize a compromise after damage is done. Michael Code, Platinion Managing Director at Boston Consulting Group and co-founder of the Cybersecurity at MIT Sloan research consortium, will speak to these challenges and also share details about an exciting pilot effort underway that just may serve as a revolutionary approach to tackling IT security in the not-so-distant future. 

11:40 AM ET 
The future of security intelligence, 2022  
Jason Steer, Principal Security Strategist, Recorded Future 

In this session, Jason Steer, Principal Security Strategist at Recorded Future, will teach you: 

  • How intelligence can augment function across your IT systems 
  • How intelligence can move your organization from a reactive to proactive stance 
  • How intelligence can be used to address risks from ransomware to which Third party supply chain partners provide the biggest risk    
  • How intelligence can be integrated into your tools and workflows you have already invested in your SOC, Vulnerability Management and many other security teams 

12:20 PM ET 
Why a Threat Intelligence Platform is the pivotal solution in your security stack 
Gino Rombley, Senior Solutions Engineer – EMEA, Anomali 

In this webinar, Gino Rombley, Senior Solutions Engineer at Anomali, discusses how a Threat Intelligence Platform is a vital part of the enterprise security stack. Furthermore, he explains how to use it and, subsequently, cash in while maximizing its value. 

We’ll look at the best practice of deploying a Threat Intelligence Platform, establishing a Threat Intelligence Program, and finally evaluating the feedback of the disseminated intelligence to the stakeholders. Join the session to learn how to manage the vast amounts of intelligence your enterprise is ingesting and consider ways to operationalize intelligence effectively. 

1:00 PM ET
The best threat intelligence sources for risk prioritization 
Igor Gvero, Principal Solutions Architect, Vulcan Cyber 

Our businesses are facing an unprecedented amount of risk. As cyber security pros, it is on us to get really good at measuring risk if we’re going to have a chance at doing something about it. Attend this session to understand the critical role comprehensive threat intelligence plays in a mature enterprise cyber risk and vulnerability prioritization effort. We will identify the top-fifteen best TI sources used to influence risk-based vulnerability prioritization, and we’ll provide several other tips and tricks in using TI data to impact risk calculations.

1:40 PM ET 
How XDR and CTI converge for stronger security risk mitigation 
Alon Arvatz, Senior Director of Product Management, Insights – a Rapid7 company 

The expanding attack perimeter has companies of all sizes struggling to monitor and protect against attackers. Security and risk leaders need more context about the threats that exist across their company’s internal and external attack surfaces, as well as the ability to ensure a rapid and complete response. 

Join this session as Alon Arvatz will explore the intersection of extended detection and response (XDR) and cyber threat intelligence (CTI) to uncover its many benefits for security risk mitigation: 

  • How CTI extends your company’s monitored environment 
  • Ways to improve signal-to-noise ratio and understand your real risk 
  • The latest technologies for driving a proactive and automated response 

2:20 PM ET 
The PhishLabs’ Quarterly Threat Trends & Intelligence Report 
John LaCour, Founder & CTO, PhishLabs 

Throughout 2021, PhishLabs has detected and mitigated hundreds of thousands of phishing, social media, email, and dark web threats targeting a broad range of enterprises and brands. The PhishLabs’ Quarterly Threat Trends & Intelligence Report provides an analysis of the latest findings and insights into key trends shaping the threat landscape.  

During our Quarterly Threat Trends & Intelligence webinar, John LaCour, Founder and CTO of PhishLabs, will discuss the report findings and what recent changes to the threat landscape mean for your business. Attendees will learn:  

  • How phishing attack volume has changed since January  
  • Which industries are targeted the most   
  • The top social media and dark web threats  
  • Which TLDs and free technical services are abused most often  
  • The leading email threats targeting user inboxes 

DAY 2 – DECEMBER 9, 2021

11:00 AM ET
KEYNOTE | Brutal truths: Dissecting – and compensating for – what CISOs can’t control 
Steve Zalewski, CISO and Founder, SHZ Security Advisory Services 

“Let’s not be safe. Let’s be honest.” That’s the mission of Steve Zalewski, founder of SHZ Security Advisory Services and veteran security leader who most recently served as CISO at Levi Strauss. Join us during this keynote discussion to hear in-the-trenches perspective that test your assumptions, spotlights perception versus reality of the security community, and unearth some uncomfortable truths that should influence the role of threat intelligence in protecting networks and data. 

11:40 AM ET
Cloud Workload Protection Service 
Eyal Arazi, Senior Product Marketing Manager, Radware 

When you migrate workloads to the public cloud, you effectively become an outsider to your own network and lose control over many aspects of security. And when your inside is out, the whole world becomes your insider threat. In this environment, security of your cloud environment is defined by the people who can access your workloads, and the permissions they have. 

However, the cloud environment makes it very easy to grant excessive permissions and very difficult to keep track of them. As a result, excessive permissions become the #1 threat to workloads hosted on the public cloud. 

Radware’s Cloud Workload Protection Service provides a comprehensive solution for security against the risk of excessive permissions within your workloads, data, and cloud accounts.

12:20 PM ET 
Active Directory security: What needs immediate priority! 
Derek Melber, Chief Technology & Security Strategist, Tenable 

The need to secure Active Directory is no longer an option, but a mandate. Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production. Security starts at securing what you have in place, as well as knowing about new attack paths. Notifications to the SOC and administrators, in real-time, are essential. However, some attacks will still occur, so real-time detection and notification of attacks is also essential. Derek Melber, 17X MVP, will guide you through the process to secure your AD and meet these goals, with a full list of tasks to complete when you get back to work. 

1:00 PM ET
Ransomware in focus 
Brianna Leddy, Director of Analysis, Darktrace 

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover. 

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? 

Join this presentation to learn how Self-Learning AI is helping thousands of organizations fight back against ransomware. We’ll discuss: 

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’ 
  • Real-world examples of ransomware detected by Self-Learning AI 
  • How Self-Learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life. 

1:40 PM ET
Proactively use threat intelligence to prevent threats? Yes, you can! 
Todd Weller, CSO, Bandura Cyber 
Tad Dickie, Advisory CISO 

Defending against threats is a volume game that requires the use of threat intelligence from multiple sources. Taking action with threat intelligence is critical to maximizing its value and more importantly, protecting organizations from threats. However, when it comes to taking action, many organizations remain too focused on reactive detection and response vs. proactive prevention. It doesn’t have to be this way. 

During this session, Todd Weller, CSO of Bandura, and Tad Dickie, Advisory CISO, will: 

  • Look at how organizations are taking action with threat intelligence today and discuss why it is too focused on reactive detection and response vs. proactive prevention 
  • Explain why the threat intelligence limits of existing security controls inhibit organizations from using threat intelligence to proactively block threats 
  • Layout a new approach that allows you to proactively take action with threat intelligence at scale