Hi [[ session.user.profile.firstName ]]

Recorded Future

  • Date
  • Rating
  • Views
  • 5 Threat Intelligence Resolutions to Keep This New Year
    5 Threat Intelligence Resolutions to Keep This New Year Allan Liska, Threat Intelligence Analyst, Recorded Future Recorded: Jan 24 2018 42 mins
    It’s that time when we strive to rid ourselves of old habits and embrace fresh ideas. In security, threat intelligence is certainly seen as one of those fresh ideas. According to Gartner’s recent “Market Guide for Security Threat Intelligence Products and Services,” “One benefit of threat intelligence is that it improves decision making in core security processes, such as incident response and policy enforcement. Better visibility of the threat landscape helps CISOs justify the need for additional resources and understand the problems they encounter.”

    In this webinar, Allan Liska, author of “Threat Intelligence in Practice,” will address five practical steps from Gartner’s report to help you make better use of threat intelligence in your organization, including:

    • Understanding the threat intelligence lifecycle.
    • Knowing the difference between data feeds and threat intelligence.
    • Centralizing, customizing, and collaborating with intelligence.
    • Integrating with your existing security infrastructure.
    • Using vulnerability intelligence to power smarter patching.
  • Machine Learning in Black and White
    Machine Learning in Black and White Chris Poulin, Principal/Director, Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future Recorded: Dec 13 2017 58 mins
    Machine learning is no longer just the tool of tech companies. While it is now being baked into most security protection technologies, threat actors are a step ahead — adopting machine learning to conduct increasingly sophisticated attacks, and to circumvent AI-based defenses. In this webinar, Chris Poulin, Principal/Director with Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future will show the good and bad of AI and machine-learning technologies, including:

    • How the collection and analysis of open source and technical data at unprecedented scale allows proactive decision making.
    • What humans can do — but beyond human scalability.
    • Examples of successful threat actor campaigns utilizing AI techniques.
  • Threat Intelligence for Every Security Function
    Threat Intelligence for Every Security Function Dave Shackleford, SANS and Chris Pace, Recorded Future Recorded: Nov 16 2017 61 mins
    There's a common misconception that threat intelligence simply means feeds of indicators just for SOCs or high-level reports only useful to security leaders. The fact is threat intelligence can be a valuable weapon in every part of your information security strategy. In this webinar, we'll take a close look at five different roles generally found within information security organizations: vulnerability management, incident response, security operations, threat analysis, and CISOs. Discover what specific processes and responsibilities are found in each team and how threat intelligence can be integrated into each to improve accuracy and reduce time to action.
  • Next-Generation Threat Intelligence
    Next-Generation Threat Intelligence Daniel Hoffman, President, SPG and Chris Pace, Technology Advocate, EMEA, Recorded Future Recorded: Nov 13 2017 50 mins
    We’ve talked in previous webcasts about what threat intelligence is and how to use it. We complete this series by taking a look forward – what we can expect from the threat intelligence technology and how it will play a part in a company’s overall information security strategy.
  • Applying Recorded Future Threat Intelligence to the IBM Security Stack
    Applying Recorded Future Threat Intelligence to the IBM Security Stack Dan Schofield, IBM Security and Glenn Wong, Recorded Future Recorded: Nov 8 2017 43 mins
    There are a variety of threat intelligence feeds and services on the market to keep IT organizations up to date on the latest security threats. But many organizations fall short in operationalizing threat intelligence and using it to enhance the effectiveness of their existing security tools.

    Recorded Future integrates with IBM's QRadar, Resilient, i2, and X-Force Exchange, so regardless of which part of the IBM Security technology stack you use, getting threat intelligence enrichment collected from open, closed, and technical sources is easily automated. Unlike common open source IP or domain reputation lists, Recorded Future's risk lists include rich context so you can make decisions quickly about suspicious activity and can take action quickly.

    Join this webinar for an in-depth look at Recorded Future’s integrations with the IBM Security technology stack and learn how to:

    • Rapidly understand true incidents in context.
    • Develop processes to quickly analyze and digest threat data.
    • Use threat intelligence when it counts most: BEFORE attacks hit.
  • Utilizing Contextual Threat Intelligence in Splunk
    Utilizing Contextual Threat Intelligence in Splunk Henry Canivel, Security Operations Engineer, Splunk and Scott Donnelly, Director of Technical Solutions, Recorded Future Recorded: Oct 18 2017 42 mins
    Security operations center (SOC) teams are continually faced with new alerts and events. Security information and event management (SIEM) solutions such as Splunk help by making it easier to collect and analyze data generated by your technology infrastructure, security systems, and business applications. However, working with this volume of data risks SOCs being overloaded and rapidly available and readable information is vital to prioritize how you respond.

    See how a pre-integrated solution between Recorded Future and Splunk gives you full context of emerging threats from the widest breadth of open, technical, and dark web sources. Join this webinar to:

    • Alleviate alert fatigue and speed decision making with machine and human-analyzed threat context.
    • Identify threats already in your system by correlating network traffic with known bad from outside your network.
    • Get a live walkthrough of how to utilize real-time threat intelligence in Splunk Enterprise.
  • Betrayal as a Service: Insider Threats in the Financial Services Industry
    Betrayal as a Service: Insider Threats in the Financial Services Industry John Wetzel, Threat Intelligence Analyst, Recorded Future Recorded: Sep 12 2017 40 mins
    Recent Recorded Future research has uncovered financial services insiders selling their services to threat actors in criminal and dark web forums.

    You may already be managing and monitoring access to critical systems and data in an effort to secure against insider threats, but external threat intelligence has a role to play in identifying potential rogue employees and their targets.

    Join this webinar to learn how you can:

    • Expose threat actors in underground forums and criminal marketplaces.
    • Monitor for breaches by insiders on paste sites, forums, or code repositories.
    • Detect early indications of insider threats, as well as breaches resulting from their actions.
  • Using Cyber Threat Intelligence Wisely
    Using Cyber Threat Intelligence Wisely Neal Dennis, Senior ISAC Analyst and Chris Pace, Technology Advocate, EMEA, Recorded Future Recorded: Aug 23 2017 60 mins
    A wide range of threat intelligence feeds and services have cropped up to keep IT organizations up to date on the latest security threats. But without mechanisms in place to actually use the information, these alerts provide little benefit.

    Attend this webinar and learn how to:

    • Identify the threat intelligence sources most valuable — and least valuable — to your security efforts.
    • Develop processes to quickly analyze and digest threat data.
    • Use threat intelligence when it counts most: BEFORE the attack hits.
  • How Only Relevant Knowledge Will Enable Proactive Defense
    How Only Relevant Knowledge Will Enable Proactive Defense Graeme Park Senior Consultant at Mason Advisory and Brian Shorten Chairman, Charities Security Forum Recorded: Aug 8 2017 65 mins
    In an age where threats are increasingly orchestrated to target specific organizations, industries, and technologies, a much greater emphasis needs to be on understanding the mind and methods of an attacker.

    Gathering and applying relevant intelligence has never been more important, but with so much threat data and so little context available, how is it possible to be confident that you will know and understand the risks that you face, and can proactively defend against them? In this webinar we’ll explain what you can learn by gathering data from varied sources to uncover threat intelligence that’s truly relevant to you.

    Key Takeaways:

    • Combinations of factors that result in relevant intelligence.
    • Examples of how threats target particular industries or technologies.
    • How intelligence can be applied for proactive defense.
    • How to get the best actionable data from your logs.
  • Threat Intelligence: Information Security's Problem Child?
    Threat Intelligence: Information Security's Problem Child? Wade Baker, Partner and Co-Founder, Cyentia Institute and Nick Frost, Principal Research Analyst, Information Security Forum Recorded: Aug 2 2017 65 mins
    Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.

    However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.

    In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:

    • Understanding the difference between strategic, operational, tactical and technical threat intelligence
    • Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
    • Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence

Embed in website or blog