ThreatIntelligenceSummit 2020 June 25, 2020 to June 25, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Leveraging Identity and Access Management for Zero Trust Wolfgang Goerlich In the modern enterprise managing both direct- and cloud-hosted resources, identity for your users is ...
[Keynote] Adopting Risk-Based Cybersecurity at Your Organization Levi Gundert What’s the best approach to enterprise security? The prevailing consensus in the industry has generally ...
Key Considerations for Evolving Your Intelligence Practice Mike Camacho • Decisions on scope with a focus on leveraging your intelligence team’s skills to support ...
Top 5 Threat Hunting Best Practices N/a Tuning your SOC to Effectively Hunt ThreatsThreat hunting is no longer a luxury, but a ...
Cyber AI: Automating the Analyst Justin Fier Cyber-attacks are becoming stealthier, faster, and more complex. Investigating and triaging these threats takes time, ...
SecOps and Response With Elite Intelligence N/a Recorded Future arms security teams with the only complete security intelligence solution powered by patented ...
How I Learned to Stop Worrying & Love the Machine: Agile Threat Intelligence N/a The world is shifting left. Agile is everywhere. Business is moving at breakneck speed. So ...
Leveraging OSINT Infrastructure Intelligence at Scale in the SOC N/a With malicious domain registrations on the rise, it is more important than ever to have ...
Zero Trust Access: The Five Step Program N/a The perimeter-based security approach of the last century is no longer adequate for securing the ...