Contact Us   |   Print Page   |   Sign In   |   Register
November 2018 ISSA Web Conference




ISSA Thought Leadership Series: The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence

Recorded (1 Hour Event) on Wednesday, November 7, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Overview:

Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don't even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.


In this webinar, you will learn:

How security professionals go about sourcing indicators
What can you do with IOCs/IOAs after locating valuable indicators
To pivot through threat actor infrastructure and determine the "Who" and the "How Bad".


 

Moderator:

C-A Washington, Founder and President, Image & Etiquette Institute

Chanel-Alexandria “C-A” Washington is the founder and president of the Image & Etiquette Institute, a personal image and organizational branding firm dedicated to empowering clients using Appearance, Relationships, and Credibility to achieve their most important goals. Prior to becoming an author, speaker, and trainer, C-A served in numerous leadership roles in both state and federal government agencies, as well as in the private sector.  C-A is an associate of the Georgia Chapter of the National Speaker’s Association, Emily Post Institute trained business etiquette trainer, former board member of the Association of Image Consultant’s International - DC Chapter, and alumna of the Harvard Kennedy School’s Women and Power program.  With her experience and expertise, C-A specializes in helping leaders and teams convey excellence with civility, style, and charm because she firmly believes that with the right techniques and habits, we can all communicate with confidence and connect more authentically. 




Speakers:

Taylor Wilkes-Pierce, Sales Engineer, Domain Tools

Taylor Wilkes-Pierce, Sales Engineer at DomainTools has over 10 years of experience in technology sales with stops at Verizon, Amazon, and Virtuozzo along the way to DomainTools. Although Taylor loves all things infosec, he has a fond spot for container virtualization, software defined storage, and basketball.

 

Greg Reith, Sr. Solutions Architect, CenturyLink

Greg Reith began his career with U.S. Army Special Forces with a specialty in Operations and Intelligence. Greg’s experience includes counter intelligence, intelligence analysis and collection at both tactical and strategic levels. At the end of his career in the military, he transitioned into Information Technology and was the Information Systems Security Officer responsible for securing Special Operations classified and unclassified networks.
 Prior to CenturyLink, Greg led the T-Mobile threat intelligence team and developed the T-Mobile threat intelligence strategy and capability. Throughout his career Greg has worked for or consulted to organizations to include federal agencies, state agencies, multi state lottery, Microsoft, AT&T, T-Mobile, power companies, banks and other organizations. Greg’s capabilities include but are not limited to, risk management, penetration testing and red-teaming, vulnerability management, security architecture, threat intelligence proofing and deploying security technologies among others
 Greg has written multiple patents in the fields of threat intelligence, big data security and identity management.
 Greg has been a speaker at multiple venues to include the Cloud Security Alliance, RFUN (Recorded Future Conference), ISACA, AGORA and others.


Ken Dunham, Senior Director, Technical Cyber Threat intelligence, Optiv

Ken Dunham brings more than 28 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions.  He also runs his own advanced intelligence response company, 4D5A Security LLC, and a non-profit for incident responders around the world called Rampart Research.  Mr. Dunham has a long history of innovation for nascent technologies and solutions such as creation of training programs for U2, Warthog, and Predator systems for the USAF, responsible disclosure (iDEFENSE), and cyber threat intelligence (iSIGHT Partners).  He is a widely published author with thousands of security articles and multiple books on topics ranging from Darknet disclosures to mobile threats and mitigation of malware.

 



Community Search
Sign In


Calendar

12/12/2018
ISSA Thought Leadership Series: 2018 User Risk Report

1/9/2019
ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

3/2/2019 » 3/3/2019
March CISO Forum San Francisco, CA

3/5/2019
Member Reception Party at RSA Conference 2019




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information