Cyber Threat Detection and Information Sharing Training Conference is about education on cyber threat detection and information sharing solutions and product training and not about why this subject is important and not about what federal cyber security projects are about to be funded.
If you are a private enterprise security manager or government intelligence community member looking for real-time cyber threat detection and information sharing solutions or a telecom operator addressing new government mandates on cyber defense, this training conference is for you.
Cyber Threat Detection and Information Sharing Training
Tuesday, October 7, 2014
9:00-9:30 a.m. Fighting Next-Generation Adversaries with Shared Threat Intelligence
Jacob West, Chief Technology Officer, Enterprise Products, Hewlett-Packard9:30-10:00 a.m. Trend Micro Cyber Threat Detection Solutions
Tom Kellermann, Chief Cybersecurity Officer, Trend Micro11:30-12:30 p.m. Session A Threat Detection from OSINT: put the web to work for you
Staying aware of current cyber threats is hard. Getting out ahead of emerging threats is harder. IT Security teams are gaining an advantage of time by monitoring and analyzing public open source reporting. Whether your team's toolkit consists of freemium and consumer internet services or sophisticated OSINT products like Recorded Future, your team will contend with the same threat actors, vulnerabilities, and exploits. In this session, we identify persistent patterns in open source reporting, and methods for leveraging these patterns to create warning and insights for defenders.
Dr. Christopher Ahlberg, Co-Founder and Chief Executive Officer, Recorded Future11:30-12:30 p.m. Session B Best Practices for Addressing Insider Threat’s
Chris Inglis, former Deputy Director, NSA and Advisory Board Member, Securonix1:30-2:30 p.m. Beyond Buzzwords: Defining Threat Intelligence, and Why It Matters
It seems everyone is talking about threat intelligence lately, but what is it? In this presentation, we will examine what defines threat intelligence, and why not knowing what it is can cost your organization and hurt your security posture. We will discuss what characterizes true threat intelligence, why what you don't know about threat intelligence could cost you, and how to evaluate threat intelligence solutions.
Eric Olson, Vice President of Product Strategy, Cyveillance3:00-4:00 p.m. Active Decomposition: Game Changing Threat Detection and Analysis
Mario Vuksan, CEO, ReversingLabsWednesday, October 8, 2014
8:30-9:00 Session A Unlocking the Value from the Overwhelming Volume of Threat Intelligence with Automation and Collaboration
Session Description: The sheer volume of available Threat Intelligence risks overwhelming security professionals as they struggle to identify the data points relevant to their organization and industry. Vorstack' has introduced its Automation and Collaboration Platform to reduce the time and effort needed to collect, validate and share information on cyber-threats and fraud intelligence. Vorstack ACP unlocks the value of investments made in tools used within the SOC, increasing operational efficiency by automating the ingestion, research, and response needed for discovering threats to allow Threat Intelligence to rapidly translate into Incident Response. Vorstack's peer-focused collaboration in trusted, auditable sharing paths enhances threat investigation without compromising on security and privacy.
Sean Brady, VP Product Management, Vorstack8:30-9:30 a.m. Session B Security Assurance and Continuous Monitoring for NFV/SDN
Tony Rutkowski, Executive VP, Yaana Technologies10:30-11:30 Session A Presentation on eSentire Asset Management Protection
Mark Sangster, Vice President, Marketing, eSentire10:30-11:30 Session B Defeating the APT Threat with Effective Vulnerability Management
To defeat the next generation of advanced persistent threats (APTs), real-time vulnerability and configuration information must be fused with relevant and accurate threat intelligence. In this session, Jonathan Trull, CISO for Qualys, will discuss best practices for the establishment and operation of a NextGen Threat & Vulnerability Management Program. He will discuss the importance of continuous scanning, staffing & training, operational best practices, and use of the Observe, Orient, Decide, and Act or OODA decision loop. Using the QualysGuard security platform, Jonathan will demonstrate how to fuse threat intelligence with vulnerability and configuration information to drive maximum risk reduction.
Jonathan Trull, CISO, QualysMonday, October 6, 2014
1:00-2:00 p.m. STIX/TAXII Introduction for Business Development and Cyber Security Professionals
Aharon Chernin, Manager, Security Automation, Depository Trust and Clearing Corporation (DTCC)2:15-3:15 p.m. Operationalizing STIX & TAXII, a message from the field
Real world experiences using Avalanche to operationalize STIX & TAXII inside both large and small companies. Get a preview of how transparent use of standards can make these complex activities a part of every organizations internal processes.
Aharon Chernin, Manager, Security Automation, Depository Trust and Clearing Corporation (DTCC)
Registration
To Register with Your Special Promotion Code or our "two for the price of one" special offer, click on http://www.issworldtraining.com/ISS_WASH/CyberThreatDetectionAlternate.htm.
Location
Bethesda North Marriott Hotel & Conference Center
5701 Marinelli Road Bethesda, Maryland 20852 USA
Toll-free: 1-800-266-9432
Colocation with ISS World Americas
Registration for Cyber Threat Detection and Information Sharing Training includes access to ISS World Americas 2014 six other conference tracks plus pre-conference seminars.
To Review ISS World Americas full conference agenda, click on http://www.issworldtraining.com/ISS_WASH/index.htm.