Western Threat Day

Thursday, August 13th, 2020
11am to 12:30pm PST

Save Your Spot

About The Event

Learn about emerging threats and innovative threat intelligence strategies from RiskIQ, Flashpoint, and Anomali! This virtual threat briefing will bring the community together to discuss threat intelligence challenges, requirements, and best practices. Industry experts and threat intelligence thought-leaders will provide briefings on today’s threat landscape, adversaries, and their attack techniques.

Who Should Attend

This session is intended for both CXO and Sr. Technical Staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.

Giving Back

We will be donating to the California Community Foundation (COVID-19 relief fund) on behalf of all of those that attend. Come learn and help those in need in our community!

Agenda

11:00amOpening Remarks
11:10amAnomali
11:35amFlashpoint
12:00pmBreak
12:05pmRiskIQ
12:30pmClosing
  

Sessions

Building Effective Cyber Threat Intelligence Programs

AJ Nash, Senior Director of Cyber Intelligence Strategy, Anomali
Threat intelligence is used to proactively combat cyber threats, cut through data overload, and increase productivity, but many organizations still struggle to utilize threat intelligence to its full potential. AJ Nash will cover the most common challenges enterprises face today, the fundamentals of intelligence, and walk through the building and maintaining an effective cyber intelligence program. Learn how to connect external data with internal knowledge to operationalize a unified intelligence picture for intelligence-driven cybersecurity solutions.

Practical Use Cases for Compromised Credential Monitoring

Scott Renna, Solutions Architect, Flashpoint
Scott Renna, Solutions Architect at Flashpoint, will walk through the importance of and use cases for monitoring compromised credentials. He'll also walk through how Compromised Credentials Monitoring (CCM) can help prevent account takeover (ATO), reduce fraud losses, and can be utilized to protect client credentials for brand protection.

Analysis of an Attack Surface: 5 Ways Threat Actors Target the Digital Enterprise

Josh Mayfield, Product Marketing, RiskIQ
There’s been a boom in internet-exposed assets from a decade of digital transformation. All accelerated by a seismic shift to a remote workforce in 2020, in large part due to the enterprise’s response to COVID-19. RiskIQ tapped our internet-wide telemetry and massive internet data collection and will share the five areas where enterprises are being targeted across their digital footprint, lack visibility, and the pathways hackers are exploiting these blind spots.

 

Earn CPE Credits
Are you a certified CISSP? You can earn up to 1 CPE for attending this event.

Sponsors

  • Anomali
  • Flashpoint
  • RiskIQ