Increase Speed, Reduce Risk: Instrumentation for Proactive Cyber Defense
Using cyber threat intelligence effectively is a crucial part of any cyber defense strategy, but dealing with data from multiple sources can be overwhelming. Does finding relevant intelligence feel like finding the needle in a haystack? And how do you take action on that intelligence to mitigate risk?
NC4® is a leader in removing friction at every point of the cyber threat intelligence lifecycle. In this presentation, we’ll talk about strategies to get the cyber threat intelligence that’s most relevant to your organization, and how to take action on it in a proactive way. Don’t just deal with threat data —leverage it to reduce cyber risk!
RecordedApr 17 201947 mins
Your place is confirmed, we'll send you email reminders
Michael Pepin, Senior Solutions Engineer and George Johnson, VP Cyber Solutions, at Celerium
No matter what game you’re playing, if you don’t understand your opponent’s play, you have no hope of stopping it. In the real world, you’re protecting assets a lot more valuable than a goal, but many of the principles of games of strategy apply. To defend successfully, you have to think like your attackers; that’s why theories of attack are a critical piece of any cyber defense strategy.
In this presentation, we’ll show you what developing a good theory of attack looks like, and how cyber threat intelligence plays a crucial role. With this strategy in play, you’ll be investing not just in security, but in organized security, which is even more effective.
George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Michael Pepin, Senior Solutions Engineer and George Johnson, VP Cyber Solutions, at NC4
Using cyber threat intelligence effectively is a crucial part of any cyber defense strategy, but dealing with data from multiple sources can be overwhelming. Does finding relevant intelligence feel like finding the needle in a haystack? And how do you take action on that intelligence to mitigate risk?
NC4® is a leader in removing friction at every point of the cyber threat intelligence lifecycle. In this presentation, we’ll talk about strategies to get the cyber threat intelligence that’s most relevant to your organization, and how to take action on it in a proactive way. Don’t just deal with threat data —leverage it to reduce cyber risk!
Celerium protects important industry sectors and their members by augmenting and leveraging cyber
threat intelligence to more actively defend against cyber threats and attacks.
Celerium’s flagship solution, Cyber Defense Network, is a unique community collaboration experience
combining communities, processes, and underlying technology to accelerate defensive actions for its
members. Members are empowered to create, share, and receive threat information easily and rapidly,
assess and prioritize relevant responses to cyber threats, and feed high-quality threat intelligence
directly into key security technologies, significantly enhancing their value and member responsiveness.
Celerium powers the next generation of information-sharing organizations, including ISAOs and ISACs.
Relied on by government agencies, enterprise risk management teams, CISOs, and SOC analysts,
Celerium supports all critical infrastructure and market sectors. Learn more at www.celerium.com.
Increase Speed, Reduce Risk: Instrumentation for Proactive Cyber DefenseMichael Pepin, Senior Solutions Engineer and George Johnson, VP Cyber Solutions, at NC4[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]46 mins