Hi [[ session.user.profile.firstName ]]

TruSTAR

  • Date
  • Rating
  • Views
  • CISO Panel on Intelligence Fusion: A New Era of Cybersecurity
    CISO Panel on Intelligence Fusion: A New Era of Cybersecurity
    Paul Kurtz, Co-Founder and CEO of TruSTAR Recorded: Feb 21 2019 62 mins
    Join TruSTAR Co-Founder and CEO Paul Kurtz as he hosts a panel with Jerry Archer, CISO of Sallie Mae, and Gary Warzala, Former CISO of PNC, VISA and Fifth Third Bank.

    In the past twenty years, companies have deployed more technology, processes, and people to defend its applications and systems than ever before… but when pressed, many CISOs will admit they still don’t have a firm grip on the security-related data inside their own four walls.

    Enter Intelligence Fusion.

    Intelligence Fusion can be defined as the convergence of cyber threat intelligence with other security data sources, including fraud and physical security data. When implemented correctly, Intelligence Fusion can speed threat investigations and lead to a more proactive security stance.

    In the panel you will learn:
    -- How to blueprint an Intelligence Fusion program within your security organization
    -- Real-life anecdotes from CISO panelists about the challenges and opportunities of Intelligence Fusion
    -- How to measure the ROI of fusion programs
  • Applying An Intelligence Fusion Framework To Healthcare Security Ops
    Applying An Intelligence Fusion Framework To Healthcare Security Ops
    Doug Helton, Intelligence Architect at TruSTAR Recorded: Feb 19 2019 62 mins
    Many security teams are adopting a Fusion Centers organizational structure to manage distributed teams and healthcare networks with highly sensitive data.

    Intelligence Fusion can be defined as the convergence of cyber threat intelligence with other security data sources, including fraud and physical security data, for better enrichment. When implemented correctly Intelligence Fusion can speed threat investigations, reduce analyst cycles, and lead to a more proactive security stance.

    On this virtual panel, TruSTAR Intelligence Architect Doug Helton will convene security leaders from Blue Cross Blue Shield and Ohio Health to explore modern intelligence management workflows and organizational structures that are making a difference.

    In the panel you will learn:
    - How to blueprint an Intelligence Fusion program within your security organization.
    - Methods for operationalizing multiple data sources and tools into simple workflows.
    - Real-life Intelligence Fusion use cases within healthcare organizations.
  • Intelligence Fusion - Enterprise Security Ops Built for Speed
    Intelligence Fusion - Enterprise Security Ops Built for Speed
    Paul Kurtz, Co-Founder & CEO of TruSTAR Recorded: Oct 30 2018 59 mins
    Just like intelligence agencies must curate and cultivate high-fidelity intelligence sources, Fortune 500 enterprises are now taking on a similar mission. Join security leaders from the White House’s National Security Council, NSA, and the Enterprise for a discussion about the challenges and opportunities that come with intelligence fusion.

    Operationalizing cyber intelligence into your security and risk management operations may sound like a simple problem, but the task is complex. You must address speed, false positives, perishable data, and false flags. Government and enterprises are taking a more holistic approach to intelligence and fusing data sources across cyber, fraud, and physical security teams and tools.

    Join Richard Clarke, the White House’s first Cyber Czar and former Assistant Secretary of State for Politico-Military Affairs, Sherri Ramsay, former Director of NSA's Threat Operations Center, and Chris Day, Chief Cybersecurity Officer at Cyxtera for an exciting panel that will explore the evolution and power of intelligence fusion.
  • The Rise of the Enterprise Intelligence Officer
    The Rise of the Enterprise Intelligence Officer
    Paul Kurtz, Co-Founder & CEO of TruSTAR Recorded: Aug 14 2018 61 mins
    A former CIA Officer and ATT's Director of Threat Intelligence sit down to discuss how intelligence operations are revolutionizing the enterprise.

    With so many different data sources and security endpoints in play, threat intelligence is now fundamentally a question of knowledge management and collaboration. Just like intelligence agencies must curate and cultivate high-fidelity intelligence sources, Fortune 500 enterprises are now taking on a similar mission.

    So, what *is* an Enterprise Intelligence Officer? You may define the role as a leader who creates business value from intelligence. Enterprise, or Knowledge Management Officers, are in charge of setting intelligence collection requirements, managing multiple intelligence sources, and working across multiple business divisions to architect security workflows while maintaining governance and control.

    Paul Kurtz, former White House National Security Council member and CEO of TruSTAR, will sit down with Sean Kanuck, Former U.S. National Intelligence Officer for Cyber Issues, and Colin Connor, Threat Intelligence and Cyber Forensics Director, to discuss the changing nature of intelligence operations in the enterprise.

    You don’t want to miss this discussion. Register today.
  • Connective Defense: Maximize Your Security Spend By Combining Cyber & Fraud Ops
    Connective Defense: Maximize Your Security Spend By Combining Cyber & Fraud Ops
    Chris Godfrey, Fraud Intelligence Lead, TruSTAR Recorded: Jul 17 2018 60 mins
    Learn how IBM & Prudential correlate their cyber and fraud intelligence. As long as adversaries can spend $1 on a campaign and force us to spend $10 to protect ourselves, enterprises will lose the war on cybercrime. Rather than building taller silos of data that become even bigger targets for criminals, enterprises must come together around common means of data exchange and collaboration. Join our moderated panel with IBM & Prudential security executives to learn how they organize their cyber and fraud teams and correlate threat intelligence and fraud data across teams to be a force multiplier for their security resources.
  • Make Your Threat Intelligence Data More Actionable
    Make Your Threat Intelligence Data More Actionable
    Paul Kurtz, Co-Founder and CEO of TruSTAR Recorded: Mar 20 2018 51 mins
    Everyone collects threat intelligence data, but how do you effectively put it to use and optimize it into your SOC workflow?

    In this panel discussion, TruSTAR will interview two Fortune 500 security analysts about how they optimize threat intelligence into their enterprise security operations.

    Our panelists will be Mike V., Senior Incident Response Analyst at a Fortune 500 healthcare company, and Troy Vennon, Cyber Threat Engineer at Columbus Collaboratory.

    Discussion topics will include:
    - Workflow - What are your favored data sources and how do you operationalize this data throughout your SOC operations?
    - Investigation Tactics - How do you escalate events from L1s to L3s? How is your team organized? What best practices help you move faster?
    - ROI - How do you report results to your CISO and the board?
  • 2018 SOC Market Predictions: How Threat Intelligence Is Changing Security Ops
    2018 SOC Market Predictions: How Threat Intelligence Is Changing Security Ops
    Paul Kurtz, Sherri Ramsay, Tony Sager Recorded: Jan 18 2018 49 mins
    A threat intelligence entrepreneur sits down with two former NSA spooks to discuss the future of security operations.

    In this valuable executive panel, TruSTAR co-founder and CEO Paul Kurtz will interview two former seasoned cybersecurity executives from the NSA. Based on thousands of hours managing SOC operations and operators and developing defense strategies, the panelists will discuss the biggest events of 2017 and what’s ahead in 2018.

    The panelists will also discuss what works, what doesn’t, and key gaps requiring attention in security operations centers today. Both SOC managers and operators will find Sherri and Tony’s insights helpful as we move into the new year.

    This will be an interactive discussion infused with current threat intelligence research along with professional anecdotes from our highly-seasoned panelists.

    Session Agenda:
    1. 2017 Threat Trend Review
    2. 2018 SOC Predictions and Gaps
    3. Open Q&A

    Panelists:
    - Sherri Ramsay, Strategic Consultant and former Director of NSA's Threat Operations Center (NTOC)
    - Tony Sager, Senior Vice President and Chief Evangelist for CIS (The Center for Internet Security), Director of SANS Innovation Center
    - Paul Kurtz, Co-Founder and CEO of TruSTAR Technology
  • IoT and Critical Infrastructure: Why We Need Intelligence Exchange
    IoT and Critical Infrastructure: Why We Need Intelligence Exchange
    Paul Kurtz, CEO & Co-Founder of TruSTAR Recorded: Jun 21 2017 44 mins
    Today we fight adversaries individually, not collectively. Companies are working in silos to defend their individual infrastructures. Security operators and defense teams do not have visibility into cyber security incident information from their peers, even though they may be seeing the same attack methods or adversaries. The lack of an effective exchange and collaboration between companies is the Achilles heel our enemies continue to exploit.

    Come and join a discussion about a new cybersecurity model that maximizes the use of the network (much like the bad guys) and incentivizes the exchange of actionable threat incident data.

    We'll look at recent critical infrastructure hacks such as Grizzly Steppe, WannaCry and CrashOverride and discuss how we can better protect ourselves for future attacks.
  • How Threat Intelligence Exchange Can Protect You From the Next WannaCry
    How Threat Intelligence Exchange Can Protect You From the Next WannaCry
    TruSTAR, R-CISC, Columbus Collaboratory Recorded: Jun 2 2017 63 mins
    Leaders from Columbus Collaboratory, R-CISC and TruSTAR Technology will describe HOW and WHY they used threat intelligence exchange to quickly respond to the breaking global WannaCry ransomware attack and share tips for how to incorporate threat intelligence exchange into your security workflow.

    Moderator:
    Paul Kurtz, Co-Founder and CEO, TruSTAR

    Speakers:
    Jeff Schmidt, VP, Chief Cyber Security Innovator, Columbus Collaboratory
    Dan Holden, Intelligence Director Retail Cyber Intelligence Sharing Center (R-CISC)
  • WikiLeaks CIA Document Dump: What You Need to Know
    WikiLeaks CIA Document Dump: What You Need to Know
    Paul Kurtz (TruSTAR), Brian White (RedOwl), Alex Rice (HackerOne) Recorded: Apr 11 2017 61 mins
    In light of the recent publishing of thousands of CIA-related documents by WikiLeaks - the largest leak of classified documents in CIA history, we will discuss the implications of the revealed information across industries and users, in the US and globally.

    Join the discussion and learn more about:
    - What is Vault 7 and how does it affect you?
    - What can we expect, as more documents get releases?
    - How will this affect organizations, and the relationship between the tech industry and government agencies?
    - Recommendations on how we can better secure our data and privacy

    Speakers:
    - Paul Kurtz, CEO & Co-Founder of TruSTAR Technology
    - Brian White, COO of RedOwl Analytics
    - Alex Rice, CTO of HackerOne

Embed in website or blog