Security teams have always sought to improve defense – and an entire industry has arisen to help them do a better job. Yet despite efforts to turn the overheated light of the latest buzzy (and too often, fuzzy) concept on ways to make magic happen (insert your favorite – or most hated - overused phrase here), organizations remain left with enduring questions too rarely answered consistently or well.
But threat intelligence can answer them – and this may come as a surprise to those who believe that threat intel is great at telling you what’s going on outside your organization, but don’t understand how to put it to work inside to make security better.
Join 451’s Scott Crawford and Anomali CEO Hugh Njemanze to find out what these questions are, how successful security organizations answer them – and how you can put the answers to work for your own security objectives.
Hugh has an illustrious 30-year career in the enterprise software industry. Hugh co-founded ArcSight in May 2000 and served as CTO as well as Executive Vice President of Research and Development. He led product development, information technology deployment, and product research at ArcSight, and expanded these responsibilities to lead all engineering and R&D efforts for HP’s Enterprise Security Products group, the organization that ArcSight became part of post-acquisition. Hugh was recently an advisor and entrepreneur at investment firm, Kleiner Perkins Caufield & Byers (KPCB). Hugh is a CISSP and holds a B.S. in computer science from Purdue University.
Scott Crawford is Research Director of the Information Security practice at 451 Research, where he leads coverage of emerging trends, innovation and disruption in the information security market. Scott is the former CISO of the Comprehensive Nuclear-Test-Ban Treaty Organization’s International Data Centre in Vienna, Austria, where he pioneered security initiatives for an NGO serving more than 150 nations. He has served in IT and security technology roles at the University Corporation for Atmospheric Research, and as a services strategist at IBM with a primary focus on security intelligence.