Loading Events

How modern cyber threat intelligence can enrich system security, risk measurement, and compliance with cybersecurity regulations

Home » Events » How modern cyber threat intelligence can enrich system security, risk measurement, and compliance with cybersecurity regulations

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

April 7 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Sponsorship Contact

 

Send an email to

Overview

Threat Intelligence is normally used to enrich the process of security assessment, providing proof on the enforcement of security controls required to be secure and compliant. As threat intelligence technology evolves, it has become more valuable and instrumental to security audit, providing needed context to the process of gap analysis, data collection, threat identification, and prioritization. During this session we will explore examples based on real world data where contextual threat intelligence can be applied directly to data security, compliance, and regulatory requirements in order to prioritize and accelerate the assessment process, obtain measure of business risk or liability, and reduce threats targeting the business.

During the presentation, you will learn the following:
• What Cyber Threat Intelligence (CTI) is and why is it important for cybersecurity
• How to use CTI to prioritize system security gaps and enhance security posture.
• How to examine your Digital Footprint in order to help predict targeted threat patterns.
• Understanding of how to use CTI findings to accelerating risk assessment.

Moderator

Lee Neely – Senior IT & Security Professional, LLNL

Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He currently leads LLNL’s Entrust team and is the CSP lead for new technology adoption specializing in mobility. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, CISSP, CISA, CISM and CRISC. He recently joined the ISSA International Board of directors, and is also the Treasurer for the CSA Boise chapter and past President for the ISC2 Eastbay Chapter, Member of the SANS NewsBites Editorial Board and SANS Analyst. You can keep up with Lee @lelandneely

http://www.linkedin.com/in/leeneely/ 

See Lee Neely‘s full profile.

Speaker/s

Christopher Strand – Chief Compliance Officer, IntSights

Christopher Strand is the Chief Compliance Officer at IntSights. As CCO, he is responsible for leading the global security risk and compliance business, helping companies bridge the gap between cybersecurity and regulatory cyber-compliance. Chris has more than 20 years of subject matter expertise in information technology and security audit assessment and he specializes in developing enterprise security platforms and markets within hyper-growth organizations.

See Christopher Strand‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top