Save Your Spot
About The Event
Learn about emerging threats and innovative threat intelligence strategies from Polyswarm, Cybersixgill, and Anomali. This virtual threat briefing will bring the community together to discuss threat intelligence challenges, requirements, and best practices. Industry experts and threat intelligence thought-leaders will provide briefings on today’s threat landscape, adversaries, and their attack techniques.
Who Should Attend
This session is intended for both CXO and Sr. Technical Staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.
We will be donating to No Kid Hungry on behalf of all attendees. No Kid Hungry is the only national campaign dedicated to ending childhood hunger in the United States. Come learn and help those in need in our community!
Predicting Tomorrow's Threats with Today's Intelligence
Evolving Threat Hunting to Adversary Hunting Using Threat IntelligenceSumukh Tendulkar, VP of Product Marketing, Cybersixgill
The practice of threat hunting has helped security teams detect and reduce dwell time of stealth threats. But most hunting expeditions focus on threats - leaving the adversary free to launch another set of attacks with different tactics. We need to evolve threat hunting into a hunt for the adversary. The deep and dark web, and other closed sources, provide valuable insights into the motivations and activities of threat actors. Over the course of this session, we will understand the motivation behind the actions of these actors, their social networks, and how to anticipate their next steps.
Best Practices of Utilizing Threat Intel to Pin Down RansomwareChristopher Elisan, VP of Threat Intelligence, Polyswarm
With the acceleration of digital transformation across industries and the widespread transition to remote work, ransomware attacks experienced triple-digit growth in 2020, becoming the most serious and prominent cyber threat to date. As their complexity increases, it becomes even more important to use the most up-to-date threat intelligence, follow the breadcrumbs, and connect the dots to paint a full picture of the attack, so organizations can better respond to these types of threats.