Loading Events

The Steak and the Sizzle: Threat Intel, SecOps, and Cyber Fundamentals

Home » Events » The Steak and the Sizzle: Threat Intel, SecOps, and Cyber Fundamentals

  • This event has passed so registration is closed.



Date and Time

March 3, 2021 @ 1:00 pm - 2:00 pm EST

Event Category

Web Conference


Irene Fisher


Lisa O'Connell


Threat intelligence has always been a hot topic and remains to be so. Understanding how your organization can benefit from threat intelligence is the first step. The second step would be how to dissect the world of threat intelligence and build real requirements that can provide value. Once you set requirements for intelligence and obtain access to threat intelligence, it needs to be applied in an operational manner. Where it belongs in security operations and how it can impact the processes and tools in place can make a world of difference. Coming full circle, threat intelligence being a hot topic has people focused on other hot topics in security. Many of these new technologies and approaches are interesting and can provide value, but in many cases, fundamentals are left behind. Taking a risk-based approach and focusing efforts on the building block of a comprehensive cyber program often gets overshadowed by the allure of trendy and new solutions. Telling the difference between the steak and sizzle can mean a make or break for the security posture of your organization.


Josh Stella – co-founder, CTO, and CEO, Fugue

Josh Stella is co-founder, CTO, and CEO of Fugue, the cloud security and compliance company. Through Fugue's masterclasses, Josh educates cloud security professionals about cloud security exploits and how to protect cloud infrastructure from bad actors. Josh demonstrates his skills as a white hat hacker. Previously, Josh was a Principal Solutions Architect at Amazon Web Services (AWS), where he supported customers in the area of national security. Josh also served as CTO for a technology startup and in numerous other IT leadership and technical roles over the past 25 years.

See Josh Stella‘s full profile.


Brandon Hoffman – CISO, Head of Security Strategy, NetEnrich

Brandon is an admired CTO and security executive well-known for driving sales growth and IT transformation. He is responsible for Netenrich’s technical sales and security strategy for both the company and its customers. Most recently, he oversaw solution architecture for Intel 471’s dark web threat intelligence business. As former CTO at Lumeta Corporation and RedSeal Networks, Brandon led technical and field development in network security, vulnerability and risk. He’s also held key practitioner roles focused in security architecture, penetration testing, networking and data center operations. Brandon holds a MS degree from Northwestern University and a BS degree from University of Illinois at Chicago.

See Brandon Hoffman‘s full profile.

Brian Kime

Brian is a senior analyst at Forrester serving security and risk professionals. He covers cyber threat intelligence, vulnerability risk management, and industrial control system security. In this role, Brian helps organizations identify, assess, and prioritize cyber and physical threats; prepare for emerging attack vectors; and reduce cyber risk in enterprise IT and operational technology (OT) environments.

Brian has over 15 years of military intelligence and cyber threat experience. Prior to joining Forrester, Brian performed cyber intelligence analysis for the Southern Company, one of the largest critical infrastructure asset owners in the US. Previously, Brian was a consultant at Secureworks where he helped build a cyber threat intelligence program for a large financial services client. Brian has published two papers on cyber threat intelligence for SANS and has spoken at SANS Atlanta.

See Brian Kime‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top