Hi [[ session.user.profile.firstName ]]

Fuel Incident Response With Threat Intelligence to Lower Breach Impact

As we’ve all learned from recent incidents at large companies, a data breach can cause insurmountable damage that is difficult to rebound from. To effectively counteract cyber attacks, companies need to have a two-pronged approach that includes both targeted threat intelligence and expedient incident response (IR).

In this webinar, Scott Donnelly of Recorded Future, will explain how threat intelligence can help secure your company, how to implement an intelligence strategy, and how a thorough threat intelligence program can reduce the risk of breaches.

Next, LIFARS CEO and Founder Ondrej Krehel will discuss how this intelligence spearheads an incident response and describe the process of investigation and evidence collection.

Register now to learn:

* How threats manifest in different ways on different layers of the Web.
* The difference between a hoax and a possible threat to companies, customers, or infrastructure.
* How having the right threat intelligence will speed up an IR process and reduce the business impact of a data breach.
* The steps of an effective IR and how having a proper incident response plan in place makes all the difference.
Recorded Mar 29 2016 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ondrej Krehel, Chief Executive Officer, LIFARS
Presentation preview: Fuel Incident Response With Threat Intelligence to Lower Breach Impact

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How Online Attackers Target Your Business and How to Stop Them Recorded: May 11 2017 63 mins
    Tom Parker, CTO, FusionX and Chris Pace, Technology Advocate, EMEA, Recorded Future
    One of the best ways to develop an effective cyber defense is to think like your attacker and then develop a commensurate response. A professional penetration tester will explain the ways your IT environment actually comes under attack and offer step-by-step recommendations on how you can prevent those attacks.

    In this webinar, learn:

    • How online attackers choose their targets
    • How cyber criminals research potential victims and find initial points of entry
    • The methods attackers use to move laterally through your infrastructure to find sensitive data
    • What steps you can take to prevent attackers from targeting your company
    • How you can improve your defenses to make targeted attacks less effective
  • Using Threat Intelligence to Prevent a Ransomware Attack Recorded: May 9 2017 58 mins
    Join Bardia Omran, Cyber Threat Intelligence Analyst at BT, and Allan Liska, Intelligence Architect at Recorded Future
    Ransomware hit between 1 in 3 businesses during 2016 and is the fastest growing malware threat according to the U.S. Department of Justice. If you've been laid back about ransomware attacks, now might be a great time to change your ways.

    Join Bardia Omran, Cyber Threat Intelligence Analyst at BT, and Allan Liska, Intelligence Architect at Recorded Future, to learn how you can use threat intelligence to help prevent a ransomware attack. This informative webinar will review strategic, educational, and operational approaches your company can employ to help in this fight including:

    • Tactics and procedures you should consider implementing.
    • How ransomware is used as a tool rather than a stand-alone weapon in targeted attacks.
    • Common risks to avoid such as password reuse and the lack of safety training.
    • How threat intelligence is used to contextualize indicators of compromise.


    Bardia Omran is a Threat Intelligence Analyst in BT Security, UK. Previously, Bardia worked on a service desk where he gained an in-depth knowledge of operating systems. He has a keen interest in malware and has spent the past two years researching it and contributing to BT's Security Threat Intelligence product.

    Allan Liska is a solutions architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of “The Practice of Network Security, Building an Intelligence-Led Security Program,” and “Securing NTP: A Quickstart Guide” and the co-author of “DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.”
  • How to Find the Threat With Threat Intelligence Recorded: May 3 2017 61 mins
    Yonesy Núñez, Vice President, Information Security, and Richard Fairhurst, Vice President, Information Security, Wells Fargo
    Finding threats on a corporate network is certainly necessary, but by definition it means the threat has already breached your perimeter and is embedded in your networks. You're now on the defensive. This special report webinar looks at techniques you can use to identify potential breaches before they enter your network.

    You'll learn about using off-network threat intelligence to identify not only potential breaches before they attack, but also potential false positives and other network noise that might distract your team and technology from doing their jobs most effectively and efficiently.
  • Real Steps to Build a Threat Intelligence Framework Recorded: May 2 2017 60 mins
    Dave Shackleford, SANS and Chris Pace, Recorded Future
    While the value of threat intelligence is widely recognized and accepted in today's cyber landscape, many organizations are still struggling to actually implement a workable framework or know what kinds of intelligence might really be useful. Join this webinar for real-world actionable steps to prevent, detect, and respond to cyber threats, including:

    • Understanding the difference between strategic, operational, tactical, and technical threat intelligence.
    • Applying threat intelligence to monitor for emerging threats, better prioritize vulnerabilities, and more clearly understand your own threat surface.
    • Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence.
  • Becoming a Threat Hunter in Your Enterprise Recorded: Apr 14 2017 63 mins
    John H Sawyer, Senior Security Analyst at InGuardians and Chris Pace, Technology Advocate at Recorded Future
    You’re tired of waiting. Tired of waiting for your technology to alert you that there’s already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter.

    And why not? Organizations who use threat hunting find it reduces their attack surface and enhances their incident response speed and accuracy. Yet few have formal programs in place with clear methodologies and repeatable processes. Attend this webinar and you’ll learn:

    • How threat hunting works
    • What a formal threat hunting program looks like
    • What skills any threat hunter should have
    • The threat hunter’s essential tricks and techniques of the trade
  • Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords? Recorded: Apr 11 2017 56 mins
    Michael Ball CISSP IT Security Consultant, Davi Ottenheimer President of flyingpenguin, Chris Pace, Recorded Future
    Headlines as we left 2016 and predictions for 2017 suggest that the future of the IT department (including information security) looks to be increasingly reliant upon machines doing the work, courtesy of the adoption and explosion of automation technologies, artificial intelligence and machine learning. How capable can machines ultimately become in securing businesses from an increasing array of threats? What role does this leave for humans?

    In this webinar we will look at the rise in popularity of artificial intelligence generally, what it means for businesses and its potential to improve efficiency and security. Which areas of security strategy may have the most to gain and lose in this transformation?

    This webinar will:

    • Consider the power of AI in threat intelligence, security operations and incident response
    • Discuss how AI and predictive analytics can lower risk
    • Question whether automation will always require the human factor
  • Threat Intelligence at 15,000 Feet: View From the Air Transport Industry Recorded: Apr 11 2017 52 mins
    Dave Ockwell-Jenner, Senior Manager, Corporate Information Security Office (CISO), SITA
    It's critical to anticipate cyber threats and mitigate them before they impact the business of aviation. As technology continues to commoditize and threats evolve, applying best practices for reducing cyber security risk in the air transport industry is key. During this webinar air transport security expert, Dave Ockwell-Jenner at SITA, will explain how:

    • Threat intelligence improves security operations center (SOC) efficiency.
    • Threat hunting and incident response are enriched by threat intelligence.
    • Intelligence sharing can be done right, in the aviation security community and beyond.

    Dave Ockwell-Jenner has an extensive background in technology: from building one of the internet’s earliest major websites, to helping secure some of the world’s most critical systems. In his current role with air transport industry IT provider, SITA, Dave leads a team of cyber security professionals dedicated to protecting critical infrastructure against cyber threats. Cyber threat intelligence is a central part of SITA's security strategy, not just to defend the enterprise, but to extend a suite of capabilities to customers, partners, and the industry as a whole. Originally from the UK, Dave now lives with his family in Kitchener, Ontario, Canada — home to one of Canada's most vibrant entrepreneurial and high-tech communities.
  • How to Implement Threat Intelligence Recorded: Mar 21 2017 66 mins
    Bryan Spano, CISSP and Chris Pace, Recorded Future
    We hear a lot of talk about threat intelligence and about how important it is to implement it, but we don’t get a lot of useful guidance on how a company that has yet to employ the technology can integrate it into an existing network. It's not sufficient to generate reports that have nuggets of crucial data mixed amongst the noise of network activity. You need to have staff that can analyze these reports and identify the crucial data, along with technology that makes it easier for crucial data to stand out.

    - What you need to know about how to implement threat intelligence
    - How to draw actionable information from the mass of data points that the technology generates

    About the speakers:

    Bryan Spano
    Cyber Security Leader/Professional, CISSP, PMP

    Experienced cyber leader with broad technical and business experience from military, federal law enforcement, and private sector roles. Project Management Professional (PMP), and Certified Information System Security Professional (CISSP)

    Chris Pace
    Technology Advocate, EMEA, Recorded Future

    Chris works for Recorded Future to engage and educate audiences on the power of real-time threat intelligence, using his extensive experience delivering security solutions to all kinds of organizations. Before beginning a career in information security, Chris trained as a Broadcast Journalist and also has worked in IT departments in the public and private sectors.
  • Ransomware on the Dark Web: How the Underground Economy Works Recorded: Mar 9 2017 63 mins
    Andrei Barysevich, Director of Advanced Collection and Levi Gundert, Vice President of Intelligence, Recorded Future
    Ransomware can be more disturbing and damaging than any other cyber crime, and payouts seem to be on the rise. Now, a new brand of extortion is emerging, where criminals threaten to sell data obtained from ransomware campaigns on the cyber criminal underground. Join this webinar to learn about the mastermind behind an infamous ransomware campaign, the mindset of criminals no longer content with small payouts, what role threat intelligence plays, and the pros and cons of paying off criminals.
  • Beyond Feeds: A Deep Dive Into Threat Intelligence Sources Recorded: Mar 7 2017 62 mins
    Dave Shackleford, Analyst, SANS Institute and Chris Pace, Technology Advocate, Recorded Future
    At this point in cyber security, mostly everyone knows what threat intelligence is, but how do you actually apply it? Many think feeds are the be all and end all for security teams. Feeds can be helpful, but in many cases they're binary and, while useful for comparison with internal security data, they might not give you the context you really crave.

    In this webinar, we will:

    - Go beyond feeds and look at specific technical, open, and dark web sources that, when combined, can open you to the multifaceted world of available threat intelligence.
    - Discuss the varied applications for this intelligence, not just for your SIEM, but every phase of the information security lifecycle
    - Show how the combination of a breadth of sources can save you hours of analysis time

    About the Speakers:

    Dave Shackleford - Analyst - SANS Institute

    Dave Shackleford is the owner and principal consultant of Voodoo Security and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. He has previously worked as CSO for Configuresoft, CTO for the Center for Internet Security, and as a security architect, analyst, and manager for several Fortune 500 companies. Dave is the author of the Sybex book Virtualization Security.

    Chris Pace - Technology Advocate - Recorded Future

    Chris works for Recorded Future to engage and educate audiences on the power of real-time threat intelligence, using his extensive experience delivering security solutions to all kinds of organizations. Before beginning a career in information security, Chris trained as a Broadcast Journalist and also has worked in IT departments in the public and private sectors.
  • Going Deep and Dark: Mining Threat Intelligence From the Hidden Web Recorded: Dec 20 2016 60 mins
    Andrei Barysevich, Director of Advanced Collection, Recorded Future
    Scratch the surface of the public internet and you'll quickly descend into the world of the deep and dark web. A place where secrets, malware and exploits are traded might not be a place where corporate teams want to tread.

    However, the dark web holds a wealth of threat intelligence which, when put in the right context, can help organizations bolster their security.

    By monitoring the hidden web for mentions of your brand or your industry, it is possible to pick up advanced notice of threats and exploits before they become an uncontrollable risk, but how do legitimate security officers mine the dark and deep webs safely, combine with technical intelligence from other sources, and use these data to their advantage?

    In this webinar we'll look at:

    • The security intelligence hidden on the dark web.

    • Ways to monitor and mine below the surface web for information.

    • Ways of feeding dark web information into other threat intelligence.

    • How to turn threat intelligence and threat hunting into tools the business can use to improve its security stance.
  • Threat Intelligence: Not a Wild Goose Chase Recorded: Dec 6 2016 61 mins
    Rob Gresham, Senior Consultant, Intel Security
    Hashes, IPs, domains, oh my, what am I to do with all this data? Analyze it. For threat intelligence to provide the proper context, you need to understand your audience and the requirements for intelligence consumption. Open source intelligence provides a capability for collecting intelligence data, but without analysis and requirements, collection efforts could produce a wild goose chase and provide little value.

    In this webinar, Rob Gresham, Senior Consultant with Intel Security, will cut to the chase to answer relevant questions such as:

    • Do I have data in the dark web and is it being sold?
    • What are my greatest risks and are they exploitable?
    • Has that exploit been used?

    Rob will discuss the contextual threat intelligence process, and share tips and tools that will help you make threat intelligence actionable beyond just the bits and bytes.
  • Prioritizing Cyber Threats With Real-Time Threat Intelligence Recorded: Nov 17 2016 63 mins
    Greg Reith, Threat Intelligence Analyst, T-Mobile
    Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive.

    In this webinar, Greg Reith, Threat Intelligence Analyst at T-Mobile, will discuss how to use real-time threat intelligence from Recorded Future to create a forward-looking strategy, including:

    • Identifying and analyzing hard-to-find threat data from the entire web including content in multiple languages.
    • Gaining relevant intelligence effectively from large volumes of threat data with smart automation, alerts, and queries.
    • Discovering trends and patterns that are useful in developing a forward-looking shift in strategy from multiple perspectives.

    Find out how you can reduce the time to collect the necessary information for building an effective threat intelligence strategy by over 400 percent.
  • Using Cyber Threat Intelligence Effectively Recorded: Nov 1 2016 66 mins
    Christopher Burgess, CEO of Prevendra
    Today’s cyber security professionals have evolved well beyond simply reacting to data breaches.

    Certainly every bit akin to James Bond's 007 agent in the battle against corporate cyber attacks, state-sponsored assaults on corporate data or targeted, criminal data breaches, executive leaders like you must now be prepared to not only mitigate attacks but have some data prior in order to better fend off these onslaughts.

    As such, threat intelligence is no less essential in defending against today’s cyber attack than political intelligence is needed in the world of global affairs of state. This webinar looks at the changing landscape in threat intelligence and how to create actionable defenses from the multiple data streams available today.
  • Exploiting Threat Intelligence Using Recorded Future and Splunk Recorded: Oct 12 2016 29 mins
    Vijay Chauhan, Global Strategic Alliances, Splunk; Glenn Wong, Director of Technology Partnerships, Recorded Future
    Anticipate and prioritize unknown threats better in Splunk with richer IOC context from the entire web enabled by real-time threat intelligence from Recorded Future. We will be joined by Vijay Chauhan, Director, Global Strategic Alliances – Security Markets for Splunk ES, who will provide an overview of the Adaptive Response Initiative.

    Watch this webinar and learn how to:

    • Enrich data in Splunk with emerging threat indicators, actors, and new vulnerabilities from Recorded Future.
    • Automatically correlate suspicious network observables with OSINT context from Recorded Future.
    • Enhance the effectiveness of your security operations center (SOC) by actively prioritizing unknown threats.

    Recorded Future combined with Splunk's Adaptive Response Framework empowers analysts to proactively identify, prioritize, and mitigate emerging threats.
  • SOC Fundamentals for Your Threat Intelligence Program Recorded: Sep 20 2016 62 mins
    Chris Crowley, Course Author at SANS, and Glenn Wong, Director of Technology Partnerships
    During this premium webinar you'll learn the fundamentals for adding threat intelligence to your security operations center (SOC).

    Whether you're just getting started with threat intelligence, or you want to brush up on the basics, this webinar will serve as your guide to setting up and integrating a successful threat intelligence strategy for your SOC.

    Join SANS instructor Chris Crowley and Recorded Future's Glenn Wong for an overview on:

    * Interaction from SOC functions to other parts of the business
    * People and skillsets to make the SOC effective
    * Processes to have a repeatable and effective operation
    * How to quickly dismiss non-critical incidents with threat intelligence
    * How to detect important incidents that are otherwise missed
    * How to gain threat awareness beyond your network

    Content is based on the new SANS MGT517 course entitled "Managing Security Operations: Detection, Response, and Intelligence."
  • Lab Test Reveals 10x Productivity Gain From Real-Time Threat Intelligence Recorded: Sep 16 2016 29 mins
    Chris Pace of Recorded Future, Robert Perdue of Codis Technologies
    To quantify the value that SOC (security operations center) analysts gain from integrating real-time threat intelligence into their SIEM (security information and event management) solution, Recorded Future commissioned Codis Technologies to conduct a lab test.

    The independent lab test revealed:

    * Applying real-time threat intelligence powered by machine learning cuts analyst time to triage a security event from a firewall log from three minutes to 1.2 seconds on average (in a controlled environment), resulting in a 10x gain in productivity.

    * SOCs are unable to effectively examine some logs, such as firewall logs, as it is too much data with insufficient context to identify relevant threats hidden within them.

    * Real-time threat intelligence can be automatically applied to potential indicators of compromise in logs by enriching them with external context and quantifying risk.

    Codis Technologies is an information security consulting firm specializing in incident detection, incident recognition, and process automation.
  • Europe: The Cyber Threat at Your Doorstep: Location-Specific Threat Intelligence Recorded: Sep 15 2016 39 mins
    Lincoln Kaffenberger, Cyber Security Professional
    Join us for the second viewing of this webinar — scheduled at a time convenient for our followers in Europe.

    Where your company is located affects its cyber health and physical security. Even though the internet has no borders, the closer an adversary is to your physical location the more harm they can inflict.

    To fully know the level of cyber risk, organizations must understand the location-specific threat actors. These actors can be a host nation government that is monitoring your communications or APT style groups, cyber criminal groups, or hacktivists. An accurate cyber risk measurement by location improves management decision making, increases security awareness, reduces risk, and can increase operational effectiveness.

    In this webinar Lincoln Kaffenberger, cyber security professional at an international financial services institution will examine:

    • The related geographical cyber risks that people and organizations experience as they move from location to location.
    • A framework for understanding, assessing, and measuring location-specific cyber risk.
    • How threats and risks posed by them can be measured through an empirical model, standardized across all locations.
    • How to quickly assess cyber threats related to a location using real-time threat intelligence from the open, deep, and dark web.
  • The Cyber Threat at Your Doorstep: Location-Specific Threat Intelligence Recorded: Sep 8 2016 37 mins
    Lincoln Kaffenberger, Cyber Security Professional
    Where your company is located affects its cyber health and physical security. Even though the internet has no borders, the closer an adversary is to your physical location the more harm they can inflict.

    To fully know the level of cyber risk, organizations must understand the location-specific threat actors. These actors can be a host nation government that is monitoring your communications or APT style groups, cyber criminal groups, or hacktivists. An accurate cyber risk measurement by location improves management decision making, increases security awareness, reduces risk, and can increase operational effectiveness.

    In this webinar Lincoln Kaffenberger, cyber security professional at an international financial services institution will examine:

    • The related geographical cyber risks that people and organizations experience as they move from location to location.
    • A framework for understanding, assessing, and measuring location-specific cyber risk.
    • How threats and risks posed by them can be measured through an empirical model, standardized across all locations.
    • How to quickly assess cyber threats related to a location using real-time threat intelligence from the open, deep, and dark web.
  • Using Threat Intelligence to Stop Cyber Attacks Recorded: Sep 1 2016 66 mins
    Levin Gundert, Vice President of Intelligence and Strategy, Recorded Future
    How can enterprises use threat intelligence data to detect and stop attackers more quickly and efficiently? How can security teams identify the relevant threat information and use it to develop a swift defense? What specific threat information is needed, and how can enterprises use it to stop a particular attacker or exploit?

    In this informative webinar you'll hear security experts discuss practical ways to use threat intelligence from the web to identify the methods used by online attackers and to ferret out sophisticated attacks that wouldn’t be recognized by traditional information security defenses.

    Listen now and you'll also:

    * Learn how to integrate threat intelligence into your current practices for enterprise data defense and incident response.
    * Gain specific advice on how you can use real-time threat intelligence to fight new attacks targeted at your enterprise.
Real-Time Threat Intelligence
Recorded Future arms you with real-time threat intelligence so you can proactively defend against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the entire Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Fuel Incident Response With Threat Intelligence to Lower Breach Impact
  • Live at: Mar 29 2016 6:00 pm
  • Presented by: Ondrej Krehel, Chief Executive Officer, LIFARS
  • From:
Your email has been sent.
or close