About The Event
Learn about emerging threats and innovative threat intelligence strategies from RiskIQ, Flashpoint, and Anomali! This virtual threat briefing will bring the community together to discuss threat intelligence challenges, requirements, and best practices. Industry experts and threat intelligence thought-leaders will provide briefings on today’s threat landscape, adversaries, and their attack techniques.
Who Should Attend
This session is intended for both CXO and Sr. Technical Staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.
We will be donating to the California Community Foundation (COVID-19 relief fund) on behalf of all of those that attend. Come learn and help those in need in our community!
Building Effective Cyber Threat Intelligence Programs
AJ Nash, Senior Director of Cyber Intelligence Strategy, Anomali
Threat intelligence is used to proactively combat cyber threats, cut through data overload, and increase productivity, but many organizations still struggle to utilize threat intelligence to its full potential. AJ Nash will cover the most common challenges enterprises face today, the fundamentals of intelligence, and walk through the building and maintaining an effective cyber intelligence program. Learn how to connect external data with internal knowledge to operationalize a unified intelligence picture for intelligence-driven cybersecurity solutions.
Practical Use Cases for Compromised Credential Monitoring
Scott Renna, Solutions Architect, Flashpoint
Scott Renna, Solutions Architect at Flashpoint, will walk through the importance of and use cases for monitoring compromised credentials. He'll also walk through how Compromised Credentials Monitoring (CCM) can help prevent account takeover (ATO), reduce fraud losses, and can be utilized to protect client credentials for brand protection.
Analysis of an Attack Surface: 5 Ways Threat Actors Target the Digital Enterprise
Josh Mayfield, Product Marketing, RiskIQ
There’s been a boom in internet-exposed assets from a decade of digital transformation. All accelerated by a seismic shift to a remote workforce in 2020, in large part due to the enterprise’s response to COVID-19. RiskIQ tapped our internet-wide telemetry and massive internet data collection and will share the five areas where enterprises are being targeted across their digital footprint, lack visibility, and the pathways hackers are exploiting these blind spots.
|11:00 a.m.||Opening Remarks|