Western Threat Day
Thursday, August 13th, 2020
11am to 12:30pm PST
Save Your Spot
About The Event
Learn about emerging threats and innovative threat intelligence strategies from RiskIQ, Flashpoint, and Anomali! This virtual threat briefing will bring the community together to discuss threat intelligence challenges, requirements, and best practices. Industry experts and threat intelligence thought-leaders will provide briefings on today’s threat landscape, adversaries, and their attack techniques.
Who Should Attend
This session is intended for both CXO and Sr. Technical Staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.
Giving Back
We will be donating to the California Community Foundation (COVID-19 relief fund) on behalf of all of those that attend. Come learn and help those in need in our community!
Agenda
11:00am | Opening Remarks |
11:10am | Anomali |
11:35am | Flashpoint |
12:00pm | Break |
12:05pm | RiskIQ |
12:30pm | Closing |
Sessions
Building Effective Cyber Threat Intelligence ProgramsAJ Nash, Senior Director of Cyber Intelligence Strategy, AnomaliThreat intelligence is used to proactively combat cyber threats, cut through data overload, and increase productivity, but many organizations still struggle to utilize threat intelligence to its full potential. AJ Nash will cover the most common challenges enterprises face today, the fundamentals of intelligence, and walk through the building and maintaining an effective cyber intelligence program. Learn how to connect external data with internal knowledge to operationalize a unified intelligence picture for intelligence-driven cybersecurity solutions. |
Practical Use Cases for Compromised Credential MonitoringScott Renna, Solutions Architect, FlashpointScott Renna, Solutions Architect at Flashpoint, will walk through the importance of and use cases for monitoring compromised credentials. He'll also walk through how Compromised Credentials Monitoring (CCM) can help prevent account takeover (ATO), reduce fraud losses, and can be utilized to protect client credentials for brand protection. |
Analysis of an Attack Surface: 5 Ways Threat Actors Target the Digital EnterpriseJosh Mayfield, Product Marketing, RiskIQThere’s been a boom in internet-exposed assets from a decade of digital transformation. All accelerated by a seismic shift to a remote workforce in 2020, in large part due to the enterprise’s response to COVID-19. RiskIQ tapped our internet-wide telemetry and massive internet data collection and will share the five areas where enterprises are being targeted across their digital footprint, lack visibility, and the pathways hackers are exploiting these blind spots. |
Earn CPE Credits |