Hi [[ session.user.profile.firstName ]]

Recorded Future

  • Date
  • Rating
  • Views
  • Beyond Feeds: A Deep Dive Into Threat Intelligence Sources Beyond Feeds: A Deep Dive Into Threat Intelligence Sources Dave Shackleford, Analyst, SANS and Chris Pace, Technology Advocate, Recorded Future Recorded: Feb 9 2017 62 mins
    At this point in cyber security, mostly everyone knows what threat intelligence is, but how do you actually apply it? Many think feeds are the be all and end all for security teams. Feeds can be helpful, but in many cases they're binary and, while useful for comparison with internal security data, they might not give you the context you really crave.

    In this webinar, we'll go beyond feeds and look at specific technical, open, and dark web sources that, when combined, can open you to the multifaceted world of available threat intelligence. We'll also discuss the varied applications for this intelligence, not just for your SIEM, but every phase of the information security lifecycle and how the combination of a breadth of sources can save you hours of analysis time.
  • How to Implement Threat Intelligence How to Implement Threat Intelligence Bryan Spano, CISSP and Chris Pace, Recorded Future Recorded: Jan 25 2017 65 mins
    We hear a lot of talk about threat intelligence and about how important it is to implement it, but we don’t get a lot of useful guidance on how a company that has yet to employ the technology can integrate it into an existing network. It's not sufficient to generate reports that have nuggets of crucial data mixed amongst the noise of network activity. You need to have staff that can analyze these reports and identify the crucial data, along with technology that makes it easier for crucial data to stand out.

    This webinar delves into the details of what you need to know about how to implement threat intelligence and, just as important, how to draw actionable information from the mass of data points that the technology generates.
  • Going Deep and Dark: Mining Threat Intelligence From the Hidden Web Going Deep and Dark: Mining Threat Intelligence From the Hidden Web Andrei Barysevich, Director of Advanced Collection, Recorded Future Recorded: Dec 20 2016 60 mins
    Scratch the surface of the public internet and you'll quickly descend into the world of the deep and dark web. A place where secrets, malware and exploits are traded might not be a place where corporate teams want to tread.

    However, the dark web holds a wealth of threat intelligence which, when put in the right context, can help organizations bolster their security.

    By monitoring the hidden web for mentions of your brand or your industry, it is possible to pick up advanced notice of threats and exploits before they become an uncontrollable risk, but how do legitimate security officers mine the dark and deep webs safely, combine with technical intelligence from other sources, and use these data to their advantage?

    In this webinar we'll look at:

    • The security intelligence hidden on the dark web.

    • Ways to monitor and mine below the surface web for information.

    • Ways of feeding dark web information into other threat intelligence.

    • How to turn threat intelligence and threat hunting into tools the business can use to improve its security stance.
  • Threat Intelligence: Not a Wild Goose Chase Threat Intelligence: Not a Wild Goose Chase Rob Gresham, Senior Consultant, Intel Security Recorded: Dec 6 2016 61 mins
    Hashes, IPs, domains, oh my, what am I to do with all this data? Analyze it. For threat intelligence to provide the proper context, you need to understand your audience and the requirements for intelligence consumption. Open source intelligence provides a capability for collecting intelligence data, but without analysis and requirements, collection efforts could produce a wild goose chase and provide little value.

    In this webinar, Rob Gresham, Senior Consultant with Intel Security, will cut to the chase to answer relevant questions such as:

    • Do I have data in the dark web and is it being sold?
    • What are my greatest risks and are they exploitable?
    • Has that exploit been used?

    Rob will discuss the contextual threat intelligence process, and share tips and tools that will help you make threat intelligence actionable beyond just the bits and bytes.
  • Prioritizing Cyber Threats With Real-Time Threat Intelligence Prioritizing Cyber Threats With Real-Time Threat Intelligence Greg Reith, Threat Intelligence Analyst, T-Mobile Recorded: Nov 17 2016 63 mins
    Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive.

    In this webinar, Greg Reith, Threat Intelligence Analyst at T-Mobile, will discuss how to use real-time threat intelligence from Recorded Future to create a forward-looking strategy, including:

    • Identifying and analyzing hard-to-find threat data from the entire web including content in multiple languages.
    • Gaining relevant intelligence effectively from large volumes of threat data with smart automation, alerts, and queries.
    • Discovering trends and patterns that are useful in developing a forward-looking shift in strategy from multiple perspectives.

    Find out how you can reduce the time to collect the necessary information for building an effective threat intelligence strategy by over 400 percent.
  • Using Cyber Threat Intelligence Effectively Using Cyber Threat Intelligence Effectively Christopher Burgess, CEO of Prevendra Recorded: Nov 1 2016 66 mins
    Today’s cyber security professionals have evolved well beyond simply reacting to data breaches.

    Certainly every bit akin to James Bond's 007 agent in the battle against corporate cyber attacks, state-sponsored assaults on corporate data or targeted, criminal data breaches, executive leaders like you must now be prepared to not only mitigate attacks but have some data prior in order to better fend off these onslaughts.

    As such, threat intelligence is no less essential in defending against today’s cyber attack than political intelligence is needed in the world of global affairs of state. This webinar looks at the changing landscape in threat intelligence and how to create actionable defenses from the multiple data streams available today.
  • Exploiting Threat Intelligence Using Recorded Future and Splunk Exploiting Threat Intelligence Using Recorded Future and Splunk Vijay Chauhan, Global Strategic Alliances, Splunk; Glenn Wong, Director of Technology Partnerships, Recorded Future Recorded: Oct 12 2016 29 mins
    Anticipate and prioritize unknown threats better in Splunk with richer IOC context from the entire web enabled by real-time threat intelligence from Recorded Future. We will be joined by Vijay Chauhan, Director, Global Strategic Alliances – Security Markets for Splunk ES, who will provide an overview of the Adaptive Response Initiative.

    Watch this webinar and learn how to:

    • Enrich data in Splunk with emerging threat indicators, actors, and new vulnerabilities from Recorded Future.
    • Automatically correlate suspicious network observables with OSINT context from Recorded Future.
    • Enhance the effectiveness of your security operations center (SOC) by actively prioritizing unknown threats.

    Recorded Future combined with Splunk's Adaptive Response Framework empowers analysts to proactively identify, prioritize, and mitigate emerging threats.
  • SOC Fundamentals for Your Threat Intelligence Program SOC Fundamentals for Your Threat Intelligence Program Chris Crowley, Course Author at SANS, and Glenn Wong, Director of Technology Partnerships Recorded: Sep 20 2016 62 mins
    During this premium webinar you'll learn the fundamentals for adding threat intelligence to your security operations center (SOC).

    Whether you're just getting started with threat intelligence, or you want to brush up on the basics, this webinar will serve as your guide to setting up and integrating a successful threat intelligence strategy for your SOC.

    Join SANS instructor Chris Crowley and Recorded Future's Glenn Wong for an overview on:

    * Interaction from SOC functions to other parts of the business
    * People and skillsets to make the SOC effective
    * Processes to have a repeatable and effective operation
    * How to quickly dismiss non-critical incidents with threat intelligence
    * How to detect important incidents that are otherwise missed
    * How to gain threat awareness beyond your network

    Content is based on the new SANS MGT517 course entitled "Managing Security Operations: Detection, Response, and Intelligence."
  • Lab Test Reveals 10x Productivity Gain From Real-Time Threat Intelligence Lab Test Reveals 10x Productivity Gain From Real-Time Threat Intelligence Chris Pace of Recorded Future, Robert Perdue of Codis Technologies Recorded: Sep 16 2016 29 mins
    To quantify the value that SOC (security operations center) analysts gain from integrating real-time threat intelligence into their SIEM (security information and event management) solution, Recorded Future commissioned Codis Technologies to conduct a lab test.

    The independent lab test revealed:

    * Applying real-time threat intelligence powered by machine learning cuts analyst time to triage a security event from a firewall log from three minutes to 1.2 seconds on average (in a controlled environment), resulting in a 10x gain in productivity.

    * SOCs are unable to effectively examine some logs, such as firewall logs, as it is too much data with insufficient context to identify relevant threats hidden within them.

    * Real-time threat intelligence can be automatically applied to potential indicators of compromise in logs by enriching them with external context and quantifying risk.

    Codis Technologies is an information security consulting firm specializing in incident detection, incident recognition, and process automation.
  • Europe: The Cyber Threat at Your Doorstep: Location-Specific Threat Intelligence Europe: The Cyber Threat at Your Doorstep: Location-Specific Threat Intelligence Lincoln Kaffenberger, Cyber Security Professional Recorded: Sep 15 2016 39 mins
    Join us for the second viewing of this webinar — scheduled at a time convenient for our followers in Europe.

    Where your company is located affects its cyber health and physical security. Even though the internet has no borders, the closer an adversary is to your physical location the more harm they can inflict.

    To fully know the level of cyber risk, organizations must understand the location-specific threat actors. These actors can be a host nation government that is monitoring your communications or APT style groups, cyber criminal groups, or hacktivists. An accurate cyber risk measurement by location improves management decision making, increases security awareness, reduces risk, and can increase operational effectiveness.

    In this webinar Lincoln Kaffenberger, cyber security professional at an international financial services institution will examine:

    • The related geographical cyber risks that people and organizations experience as they move from location to location.
    • A framework for understanding, assessing, and measuring location-specific cyber risk.
    • How threats and risks posed by them can be measured through an empirical model, standardized across all locations.
    • How to quickly assess cyber threats related to a location using real-time threat intelligence from the open, deep, and dark web.

Embed in website or blog