Hi [[ session.user.profile.firstName ]]

Recorded Future

  • Date
  • Rating
  • Views
  • Intelligence-Driven Security at Relativity
    Intelligence-Driven Security at Relativity Jerry Finley, deputy CSO and director of cybersecurity at Relativity Recorded: Sep 17 2018 36 mins
    Relativity helps over 170,000 users in more than 40 countries to manage large volumes of data and quickly identify key issues during litigation and internal investigations. Relativity's cloud solution, RelativityOne, offers all the functionality of Relativity in a secure and comprehensive SaaS product. To ensure the safety of all its users, Relativity must put intelligence into all aspects of its security infrastructure.

    Listen to hear from Jerry Finley, deputy CSO and director of cybersecurity at Relativity, as he goes through the company’s threat intelligence strategy, including:

    • Leveraging threat intelligence in continuous proactive hunting operations.
    • Correlating vulnerabilities to known exploits for more effective patching.
    • Building a central team of analysts for proactive searching and collaboration.
  • Collecting and Analyzing Intelligence About Potential Threats
    Collecting and Analyzing Intelligence About Potential Threats Allan Liska, Senior Security Architect, Recorded Future Recorded: Jul 25 2018 45 mins
    Hear Allan Liska, senior security architect at Recorded Future, speak on a panel of experts on how to uncover the motivation and mitigation methods for threat actors targeting your organization.
  • How the Gap Uses Recorded Future Fusion for Advanced Automation
    How the Gap Uses Recorded Future Fusion for Advanced Automation Rodrigo Bijou, Senior Manager – Cyber Defense Center (CDC), Gap Inc. Recorded: Jul 16 2018 29 mins
    With almost 3,200 stores and more than 150,000 employees worldwide, Gap’s security is incredibly complex. To secure its employees, partners, and customers, the company is drawing together insights from numerous sources of threat data, helping the largest specialty retailer in the United States stay ahead of emerging cyberattacks.

    Listen to Rodrigo Bijou, senior manager at Gap’s Cyber Defense Center (CDC), explain how the company uses Recorded Future Fusion to:

    • Speed up the investigation of indicators through smarter automation.
    • Augment workflows in security operations with contextualized threat intelligence.
    • See gains in productivity as well as greater confidence in security decisions.
  • How Does the Intelligence Cycle Fit in Cybersecurity?
    How Does the Intelligence Cycle Fit in Cybersecurity? Vince Peeler, Optum and Lauren Zabierek, Recorded Future Recorded: Jun 12 2018 59 mins
    The intelligence cycle is a process that follows five steps: direction, collection, processing, analysis and production, and dissemination. This cycle was consequential during the Cold War and into much of the early 21st century. But, does it fit into current cybersecurity processes?

    Listen to Vince Peeler, manager of intelligence services – cyber defense at Optum and Lauren Zabierek, senior analyst and manager for the U.S. public sector intelligence services team at Recorded Future to learn:

    • Which pieces of the intelligence cycle fit and where.
    • The three levels of analysis — strategic, operational, and tactical.
    • How to manage the ever-increasing amounts of data.
  • Dark Web Insights: Threat Research Trends and Current Events
    Dark Web Insights: Threat Research Trends and Current Events Allan Liska, Andrei Barysevich, and Juan Andrés Guerrero-Saade (JAGS) Recorded: May 14 2018 59 mins
    Hear members of the Insikt Group, Recorded Future’s expert team of researchers, provide their insights on recent dark web trends, current events including threat actor activity, and more.

    This casual panel offers a unique look into the underground economy and allows you to ask your most pressing questions.

    Panelists:

    Allan Liska is a senior security architect at Recorded Future. With more than 15 years of experience in information security, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of “Building an Intelligence-Led Security Program,” among other topics in cybersecurity.

    Andrei Barysevich is the director of advanced collection at Recorded Future. A native Russian speaker, he specializes in threat intelligence on highly restrictive criminal communities. Andrei was previously a private consultant for the FBI's New York Cybercrime field office and has been involved in multiple high-profile international cases resulting in successful convictions of members of crime syndicates.

    Juan Andrés Guerrero-Saade (JAGS) is principal security researcher at Recorded Future’s Insikt Group. Previously, he worked at Kaspersky’s GReAT and served as senior cybersecurity and national security advisor to the President of Ecuador. He is the author of “The Ethics and Perils of APT Research: An Unexpected Transition Into Intelligence Brokerage,” among other topics in cybersecurity.
  • Bigger Risks, Bigger Challenges
    Bigger Risks, Bigger Challenges Tim McCreight, Risk Rebels and Chris Pace, Recorded Future Recorded: May 2 2018 60 mins
    New research shows that the job of cybersecurity staffers is getting far more difficult than it was five years ago. Gone are the days when updating A/V software and applying patches were considered "security." Today's security pros need to be concerned with threat intelligence, threat hunting, far more malicious zero-days and state-sponsored attacks. Today's webcast looks at the challenges today's security team faces, the training necessary today to meet those challenges, and the pressures on the infosec team that might not have existed just a few years ago.
  • Meeting the Challenges of Operationalizing Threat Intelligence
    Meeting the Challenges of Operationalizing Threat Intelligence Jon Oltsik, Senior Analyst, ESG Recorded: Apr 27 2018 42 mins
    Recent research from analyst group ESG says that 58 percent of organizations have some kind of threat intelligence program, but a reliance on manual processes and disparate tools means many firms struggle to get real value from the intelligence they have. But, this doesn’t have to be the case.

    In this webinar, Jon Oltsik, author of the ESG report titled “Operationalizing Threat Intelligence With a Complete Solution” will look at how organizations can better align their threat intelligence capabilities to their pain points and security goals.

    Watch the recording now to learn:

    • Why security operations is harder now than two years ago.
    • What is needed for a valuable threat intelligence solution.
    • How to get the most out of your threat intelligence program.
  • 6 Questions to Ask Before You Invest in Cyber Threat Intelligence
    6 Questions to Ask Before You Invest in Cyber Threat Intelligence Chris Pace Technology Advocate, Recorded Future Recorded: Mar 22 2018 39 mins
    Threat intelligence done right gives you a window into the world of your adversary. But with so many types of threat intelligence services and products available, finding the right one to meet your objectives can be challenging. How do you decide which features are must-haves for your organization?

    This webinar will help you answer six key questions at the center of deciding how to invest in a threat intelligence solution. Watch the recording now to find out:

    • Why it’s not all about sources — context is key.
    • The advantages of integrating threat intelligence with your other security solutions.
    • How you can scale your threat intelligence investment over time.
  • 5 Threat Intelligence Resolutions to Keep This New Year
    5 Threat Intelligence Resolutions to Keep This New Year Allan Liska, Threat Intelligence Analyst, Recorded Future Recorded: Jan 24 2018 42 mins
    It’s that time when we strive to rid ourselves of old habits and embrace fresh ideas. In security, threat intelligence is certainly seen as one of those fresh ideas. According to Gartner’s recent “Market Guide for Security Threat Intelligence Products and Services,” “One benefit of threat intelligence is that it improves decision making in core security processes, such as incident response and policy enforcement. Better visibility of the threat landscape helps CISOs justify the need for additional resources and understand the problems they encounter.”

    In this webinar, Allan Liska, author of “Threat Intelligence in Practice,” will address five practical steps from Gartner’s report to help you make better use of threat intelligence in your organization, including:

    • Understanding the threat intelligence lifecycle.
    • Knowing the difference between data feeds and threat intelligence.
    • Centralizing, customizing, and collaborating with intelligence.
    • Integrating with your existing security infrastructure.
    • Using vulnerability intelligence to power smarter patching.
  • Machine Learning in Black and White
    Machine Learning in Black and White Chris Poulin, Principal/Director, Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future Recorded: Dec 13 2017 58 mins
    Machine learning is no longer just the tool of tech companies. While it is now being baked into most security protection technologies, threat actors are a step ahead — adopting machine learning to conduct increasingly sophisticated attacks, and to circumvent AI-based defenses. In this webinar, Chris Poulin, Principal/Director with Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future will show the good and bad of AI and machine-learning technologies, including:

    • How the collection and analysis of open source and technical data at unprecedented scale allows proactive decision making.
    • What humans can do — but beyond human scalability.
    • Examples of successful threat actor campaigns utilizing AI techniques.

Embed in website or blog