ThreatIntelligence 2016 Dec. 6, 2016 to Dec. 7, 2016, new orleans,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Developing the National Cyber Incident Response Plan Neil Jenkins The Department of Homeland Security is working with the private sector, federal departments and agencies, ...
Tech Spotlight - Humanizing Threat Intelligence Chris Jacob While the rest of the cyber world keeps a collective eye towards machine learning, artificial ...
A1 Check Yo Self Before You Wreck Yo Self: The New Wave Of Account Checkers And Underground Rewards Fraud Ben Brown There's a new wave of account checker gangs and a coinciding explosion in the underground ...
B1 Blue Team Basics: Threat Intel in the Cyber Attack Lifecycle Dave Ockwell-jenner There is sometimes a tendency to collect and analyze threat intelligence just for its own ...
Convert Phishing Attacks Into Your Phishing Defense Hugh Docherty Companies searching for a silver bullet to stop phishing attacks have realized that the best ...
A2 Barbarians at the Gate(way) Dave Lewis This talk will examine the tools, methods, and data behind the DDoS attacks prevalent in ...
B2 Why Sharing Threat Intelligence is Important Scott Dowsett Sharing is a popular topic in Threat Intelligence circles. We have ISAC's, sharing standards like ...
A3 The Hidden Enemy: Malvertising and Ransomware Adam Kujawa Malvertising is becoming more sophisticated and prevalent—and is the vehicle of choice for injecting ransomware. ...
B3 Building a Requirements Meta-Model (Interactive Session) Rafal wh1t3rabbit Los , Danny Pickens The core of any program is a strong set of validated requirements. You must identify ...
A4 Threat Intelligence is Everyone's Job Alexi Phillipson Threat intelligence is often the newest member of an information security team and loses out ...
B4 Staffing for a Threat Management Program Tim Callahan When building your threat intelligence capability, what are the key staffing elements you need to ...
Power Breakfast Session: Enrich All the Things and Create Your Own Threat Intelligence Mark Kendrick Your own network can be a powerful source of data for incident response and proactive ...
Keynote: The Internet of Intelligence: The Evolution of the Self-Aware Global Network Chris Blask "Threat Intelligence" has moved from a technical descriptor to an industry catchphrase. While many catchphrases ...
Tech Spotlight - Exploit Capture – The devil is in the details Rob Johnson NSS Labs Sr Solutions Engineer Rob Johnson will quickly break down each phase of an ...
A5 Taking Your C-Suite Executives on a Tour of the Dark Web Diana Kelley There's no limit to the scary headlines about what goes on in the dark web. ...
B5 Hacktivist or Faketivist? Using Threat Intelligence to Unmask Adversaries Marika Chauvin N/A
A6 Hunting Advanced Adversaries with Memory Analytics Andrew Case Traditionally, threat intelligence has focused on sharing artifacts and indicators extracted through disk and network ...
B6 Lessons of a Cyber Warrior Connie Barrera We’re under attack, and to say organizations across the board are slow to respond is ...
A7 Threat Intelligence Reality Check: Endpoint Detection and Response Mark Butler Attend this talk to hear how FiServ improved endpoint detection and response capabilities though building ...
B7 Because Math – Putting the Intelligence back in Threat Intel Edward Mccabe This talk is aimed at addressing the need for intelligent human analysis and the over ...
A8 Intelligence Preparation for Operational Resilience (IPOR) Lisa Young , Doug Gray Operational resilience practitioners in industry, government, and the military have the unenviable task of recommending ...