Loading Events

Thoughts on operationalizing your threat intelligence capabilities

Home » Events » Thoughts on operationalizing your threat intelligence capabilities

Sponsor

Details

Date and Time

November 18 @ 1:00 pm - 2:00 pm EST

Event Category

Web Conference

Organizer

Sponsorship Contact

 

Send an email to

Overview

In this webinar, you’ll hear about some common challenges organizations face when putting their threat intelligence to work, whether it’s sourced internally or externally. Too many SOCs are drowning in data today, and there is almost always room to improve how you consume and apply your existing threat intelligence – as an example, many successful SOCs integrate their threat intelligence capability directly within their orchestration and automation solution (SOAR). You’ll hear some thoughts around how to make the most of your existing threat intelligence data, and you’ll leave the webinar with some actionable ideas to consider within your own environment.

Moderator

Speaker/s

Ben Smith – Field Chief Technology Officer (North America), RSΛ Security

Ben Smith is Field Chief Technology Officer (North America) with RSA. He brings more than 25 years’ experience in the information security, networking and telecommunications industries; his prior employers include UUNET, CSC, and the US Government, along with several technology startups. Smith holds industry certifications in information security (CCISO, CISSP), risk management (CRISC), and privacy (CIPT); he is an acknowledged contributor to NIST SP 1800-1, -3, and -7; and he serves as an appointed member of the Cybersecurity Canon Committee. He has presented internationally at cybersecurity events sponsored by Gartner, FS-ISAC, SANS, IANS, CERT/SEI, RSAC, ISSA, (ISC)2, ISACA, Infosecurity, BSides, ASIS, InfraGard, HTCIA, SecureWorld, ISMG, SC Media, SIRA, RMA, IIA, MWCA, ICI and other organizations.

See Ben Smith‘s full profile.

Lou Senko – Chief Availability Officer and Senior Vice President, Q2

An engineer by trade and coach by passion, building skillful development and IT teams has been a trademark of Lou Senko’s career. Lou brings more than 20 years of experience leading architectural design, development, implementation and integration of enterprise-wide solutions to meet global business, financial and market demands to Q2. His organization is responsible for the Availability, Performance and Quality of the solutions being delivered, and the Security and Compliance of the environments they are delivered from. This aligns Hosting, Support with Security & Compliance under a single organization.

Known for his prowess for reengineering organizations, Lou has a successful history of aligning teams with strategic roadmaps to deliver scalable, resilient and value-driven services. He also offers a unique expertise in corporate mergers and acquisitions, participating in more than 25 M&A deals throughout his career.

Prior to Q2, Lou served as the director of technology at the Michael & Susan Dell Foundation. Lou also served 12 years at Activant Solutions before its merger with Epicor Software Corp, where he stayed on as the senior director of global support operations.

With an advanced degree in electrical engineering from Northern Alberta Institute of Technology, Lou and his family landed in Austin in 1999. Now an active member of Austin’s community, Lou serves as president for Austin’s Society of Information Management and serves on several industry advisory board. He is a sought-after resource for banking, credit union and technology journalists, has been featured on a number of industry podcasts and enjoys speaking to technology leaders throughout the U.S. Lou is an active mentor for an undergrad team at the McCombs School of Business and mentors students in the Westlake High School Business Incubator program.

Lou was recently recognized with the Austin IT Executive of the Year award for 2019, while his team won Q2’s coveted Team of the Year.

See Lou Senko‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top