Hi [[ session.user.profile.firstName ]]

TruSTAR

  • Date
  • Rating
  • Views
  • The Rise of the Enterprise Intelligence Officer
    The Rise of the Enterprise Intelligence Officer Paul Kurtz, Co-Founder & CEO of TruSTAR Recorded: Aug 14 2018 61 mins
    A former CIA Officer and ATT's Director of Threat Intelligence sit down to discuss how intelligence operations are revolutionizing the enterprise.

    With so many different data sources and security endpoints in play, threat intelligence is now fundamentally a question of knowledge management and collaboration. Just like intelligence agencies must curate and cultivate high-fidelity intelligence sources, Fortune 500 enterprises are now taking on a similar mission.

    So, what *is* an Enterprise Intelligence Officer? You may define the role as a leader who creates business value from intelligence. Enterprise, or Knowledge Management Officers, are in charge of setting intelligence collection requirements, managing multiple intelligence sources, and working across multiple business divisions to architect security workflows while maintaining governance and control.

    Paul Kurtz, former White House National Security Council member and CEO of TruSTAR, will sit down with Sean Kanuck, Former U.S. National Intelligence Officer for Cyber Issues, and Colin Connor, Threat Intelligence and Cyber Forensics Director, to discuss the changing nature of intelligence operations in the enterprise.

    You don’t want to miss this discussion. Register today.
  • Connective Defense: Maximize Your Security Spend By Combining Cyber & Fraud Ops
    Connective Defense: Maximize Your Security Spend By Combining Cyber & Fraud Ops Chris Godfrey, Fraud Intelligence Lead, TruSTAR Recorded: Jul 17 2018 60 mins
    Learn how IBM & Prudential correlate their cyber and fraud intelligence. As long as adversaries can spend $1 on a campaign and force us to spend $10 to protect ourselves, enterprises will lose the war on cybercrime. Rather than building taller silos of data that become even bigger targets for criminals, enterprises must come together around common means of data exchange and collaboration. Join our moderated panel with IBM & Prudential security executives to learn how they organize their cyber and fraud teams and correlate threat intelligence and fraud data across teams to be a force multiplier for their security resources.
  • Make Your Threat Intelligence Data More Actionable
    Make Your Threat Intelligence Data More Actionable Paul Kurtz, Co-Founder and CEO of TruSTAR Recorded: Mar 20 2018 51 mins
    Everyone collects threat intelligence data, but how do you effectively put it to use and optimize it into your SOC workflow?

    In this panel discussion, TruSTAR will interview two Fortune 500 security analysts about how they optimize threat intelligence into their enterprise security operations.

    Our panelists will be Mike V., Senior Incident Response Analyst at a Fortune 500 healthcare company, and Troy Vennon, Cyber Threat Engineer at Columbus Collaboratory.

    Discussion topics will include:
    - Workflow - What are your favored data sources and how do you operationalize this data throughout your SOC operations?
    - Investigation Tactics - How do you escalate events from L1s to L3s? How is your team organized? What best practices help you move faster?
    - ROI - How do you report results to your CISO and the board?
  • 2018 SOC Market Predictions: How Threat Intelligence Is Changing Security Ops
    2018 SOC Market Predictions: How Threat Intelligence Is Changing Security Ops Paul Kurtz, Sherri Ramsay, Tony Sager Recorded: Jan 18 2018 49 mins
    A threat intelligence entrepreneur sits down with two former NSA spooks to discuss the future of security operations.

    In this valuable executive panel, TruSTAR co-founder and CEO Paul Kurtz will interview two former seasoned cybersecurity executives from the NSA. Based on thousands of hours managing SOC operations and operators and developing defense strategies, the panelists will discuss the biggest events of 2017 and what’s ahead in 2018.

    The panelists will also discuss what works, what doesn’t, and key gaps requiring attention in security operations centers today. Both SOC managers and operators will find Sherri and Tony’s insights helpful as we move into the new year.

    This will be an interactive discussion infused with current threat intelligence research along with professional anecdotes from our highly-seasoned panelists.

    Session Agenda:
    1. 2017 Threat Trend Review
    2. 2018 SOC Predictions and Gaps
    3. Open Q&A

    Panelists:
    - Sherri Ramsay, Strategic Consultant and former Director of NSA's Threat Operations Center (NTOC)
    - Tony Sager, Senior Vice President and Chief Evangelist for CIS (The Center for Internet Security), Director of SANS Innovation Center
    - Paul Kurtz, Co-Founder and CEO of TruSTAR Technology
  • IoT and Critical Infrastructure: Why We Need Intelligence Exchange
    IoT and Critical Infrastructure: Why We Need Intelligence Exchange Paul Kurtz, CEO & Co-Founder of TruSTAR Recorded: Jun 21 2017 44 mins
    Today we fight adversaries individually, not collectively. Companies are working in silos to defend their individual infrastructures. Security operators and defense teams do not have visibility into cyber security incident information from their peers, even though they may be seeing the same attack methods or adversaries. The lack of an effective exchange and collaboration between companies is the Achilles heel our enemies continue to exploit.

    Come and join a discussion about a new cybersecurity model that maximizes the use of the network (much like the bad guys) and incentivizes the exchange of actionable threat incident data.

    We'll look at recent critical infrastructure hacks such as Grizzly Steppe, WannaCry and CrashOverride and discuss how we can better protect ourselves for future attacks.
  • How Threat Intelligence Exchange Can Protect You From the Next WannaCry
    How Threat Intelligence Exchange Can Protect You From the Next WannaCry TruSTAR, R-CISC, Columbus Collaboratory Recorded: Jun 2 2017 63 mins
    Leaders from Columbus Collaboratory, R-CISC and TruSTAR Technology will describe HOW and WHY they used threat intelligence exchange to quickly respond to the breaking global WannaCry ransomware attack and share tips for how to incorporate threat intelligence exchange into your security workflow.

    Moderator:
    Paul Kurtz, Co-Founder and CEO, TruSTAR

    Speakers:
    Jeff Schmidt, VP, Chief Cyber Security Innovator, Columbus Collaboratory
    Dan Holden, Intelligence Director Retail Cyber Intelligence Sharing Center (R-CISC)
  • WikiLeaks CIA Document Dump: What You Need to Know
    WikiLeaks CIA Document Dump: What You Need to Know Paul Kurtz (TruSTAR), Brian White (RedOwl), Alex Rice (HackerOne) Recorded: Apr 11 2017 61 mins
    In light of the recent publishing of thousands of CIA-related documents by WikiLeaks - the largest leak of classified documents in CIA history, we will discuss the implications of the revealed information across industries and users, in the US and globally.

    Join the discussion and learn more about:
    - What is Vault 7 and how does it affect you?
    - What can we expect, as more documents get releases?
    - How will this affect organizations, and the relationship between the tech industry and government agencies?
    - Recommendations on how we can better secure our data and privacy

    Speakers:
    - Paul Kurtz, CEO & Co-Founder of TruSTAR Technology
    - Brian White, COO of RedOwl Analytics
    - Alex Rice, CTO of HackerOne
  • Why Critical Infrastructure Cybersecurity Is In a League of Its Own
    Why Critical Infrastructure Cybersecurity Is In a League of Its Own Paul Kurtz, CEO & Co-Founder, and Shimon Modi, Dir of Product & Technology at TruSTAR Technology Recorded: Mar 15 2017 45 mins
    It seems like it’s every other day the U.S. Government Accountability Office (GAO) is issuing a new critical infrastructure (CI) condemnation on a government agency or an intrepid security researcher is playing out what would happen to our electrical grid if a ransomware attack were to occur.

    But have we ever paused to consider exactly what it takes to protect critical infrastructure? In doing so, we can learn how to better protect ourselves.

    This session will highlight the similarities and differences of what it takes to protect critical infrastructure compared to the enterprise.

    Threat models are changing, which require a change in core capabilities necessary to protect CI. We’ll pull up some common tactics, techniques and procedures (TTPs) used in real world attacks using TruSTAR’s threat intelligence exchange platform to show how intelligence exchange can play a role in protecting CI in the future.

    This session will be led by Paul Kurtz, co-founder and CEO of TruSTAR Technology and former Senior Director for Critical Infrastructure Protection on the White House's Homeland Security Council (HSC), as well as Shimon Modi, Director of Product & Technology at TruSTAR and former Cybersecurity R&D Manager at Accenture Technology Labs, where he led the innovation strategy and build out of the Industrial IoT security capability.
  • Top Trends That Will Shape Your Cybersecurity Strategy in 2017
    Top Trends That Will Shape Your Cybersecurity Strategy in 2017 Mark Weatherford (vArmour), Ann Barron-DiCamillo (AmEx), Paul Kurtz (TruSTAR), Leo Taddeo (Cryptzone), Usman Choudhary(VIPRE) Recorded: Feb 21 2017 61 mins
    Discover the latest trends in cyber attacks and how they are shaping the security strategy across industries and on a national level.

    Join this keynote panel session for an interactive discussion on the emerging technologies and tactics used by attackers, the role of artificial intelligence and machine learning in cyber attacks and cybersecurity, and the best practices for improving security for your organizations.

    Moderator:
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour

    Panelists:
    - Ann Barron-DiCamillo, VP Cyber Threat Intelligence & Incident Response at American Express
    - Paul Kurtz, CEO of TruSTAR
    - Leo Taddeo, CSO of Cryptzone
    - Usman Choudhary, SVP & CPO at ThreatTrack (VIPRE)
  • The Value of Redaction and Anonymity: Protecting Against Unwanted Exposure
    The Value of Redaction and Anonymity: Protecting Against Unwanted Exposure Paul Kurtz, Co-Founder & CEO of TruSTAR Technology Recorded: Oct 14 2016 27 mins
    We need a different type of intelligence exchange in this day and age - an exchange that is designed for timely and actionable insights. TruSTAR finds that there are 2 core pillars that enable this: Protecting Against Unwanted Exposure + Immediate RoI to Incentivize Early Use.

    We will be covering the 1st pillar in this webinar. The focus on privacy and the protection of unwanted market and reputational risk is a key ingredient to enabling a powerful and active exchange.

    Join TruSTAR's CEO Paul Kurtz and learn about the value of Redaction and Anonymity when thinking about a successful and active incident exchange.

Embed in website or blog