Hi [[ session.user.profile.firstName ]]

How to Respond to Emerging Cyber Threats

In today’s world, many threat intelligence providers provide free threat data to help the community outside of their existing customer base. Governments at all levels are sharing threat and adversary specific data. Data sharing via open source feeds has expanded greatly.

Becoming aware of these new sources is one thing, but enabling users to consume, understand and enable the data in their security infrastructure and operations is a challenge.

In this webinar, we will discuss the following:
* How analysts can make open source threat intelligence feeds actionable
* How a scoring and expiration policies can improve security operations automation capabilities
* How to integrate the right threat data within your SOC tools to reduce time to detection.
Recorded Aug 11 2020 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ayuba "JJ" Ndiaye, Account Manager, ThreatQuotient and Syed Kaptan, Threat Intelligence Engineer, ThreatQuotient
Presentation preview: How to Respond to Emerging Cyber Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Threat Hunting and Incident Response Oct 1 2020 5:00 pm UTC 30 mins
    Ayuba "JJ" Ndiaye, Account Manager, ThreatQuotient and Danil Panache, Threat Intelligence Engineer, ThreatQuotient
    With the ever-evolving cyber security landscape, it is becoming more and more difficult for teams to stay ahead of emerging threats and actors. Disparate ecosystem tools, workflows, and enough “single panes of glass” to outfit an entire building mire security teams who try to simplify and streamline incident response and threat hunting.

    Join ThreatQ as we dive into uncovering how security teams can help fill that missing link between threat intelligence and security tools, and enable multiple teams to collaborate on the same set of data without stepping on each others’ toes.
    We will be discussing how to:
    -Identify incidents through prioritized threat intel and indicators on your network
    -Launch a coordinated investigation involving multiple teams within your SOC
    -Hunt for threats by leveraging the Threat Library for intelligence-fueled hypothesis investigation
  • Threat Hunting and Incident Response Oct 1 2020 8:00 am UTC 30 mins
    Ayuba "JJ" Ndiaye, Account Manager, ThreatQuotient and Danil Panache, Threat Intelligence Engineer, ThreatQuotient
    With the ever-evolving cyber security landscape, it is becoming more and more difficult for teams to stay ahead of emerging threats and actors. Disparate ecosystem tools, workflows, and enough “single panes of glass” to outfit an entire building mire security teams who try to simplify and streamline incident response and threat hunting.

    Join ThreatQ as we dive into uncovering how security teams can help fill that missing link between threat intelligence and security tools, and enable multiple teams to collaborate on the same set of data without stepping on each others’ toes.
    We will be discussing how to:
    -Identify incidents through prioritized threat intel and indicators on your network
    -Launch a coordinated investigation involving multiple teams within your SOC
    -Hunt for threats by leveraging the Threat Library for intelligence-fueled hypothesis investigation
  • Enhancing Orchestration using Threat Intelligence Sep 24 2020 5:00 pm UTC 23 mins
    Sean Drowsky, Threat Intelligence Engineer, ThreatQuotient and Jana Lind, Regional Sales Director, ThreatQuotient
    The aim of orchestration is to automate and optize reproducible tasks. In order to orchestrate these tasks successfully, the righ data needs to be used. Orchestrate better and more in depth using the right threat intelligence for your organization. In this webinar, we will focus on developing a malware playbook using prioritized threat intelligence. We will focus on the following three areas:
    1. The process to enrich threat intelligence to provide better automation capabilities.
    2. Automating your threat intelligence to give you analyst a good place to start.
    3. Managing orchestration from your threat intelligence platform.
  • Enhancing Orchestration using Threat Intelligence Sep 24 2020 8:00 am UTC 23 mins
    Sean Drowsky, Threat Intelligence Engineer, ThreatQuotient and Jana Lind, Regional Sales Director, ThreatQuotient
    The aim of orchestration is to automate and optize reproducible tasks. In order to orchestrate these tasks successfully, the righ data needs to be used. Orchestrate better and more in depth using the right threat intelligence for your organization. In this webinar, we will focus on developing a malware playbook using prioritized threat intelligence. We will focus on the following three areas:
    1. The process to enrich threat intelligence to provide better automation capabilities.
    2. Automating your threat intelligence to give you analyst a good place to start.
    3. Managing orchestration from your threat intelligence platform.
  • Leveraging Threat Intelligence for Efficient Vulnerability Management Recorded: Sep 15 2020 35 mins
    Anthony Stitt, Regional Director APAC, ThreatQuotient Robert Streamer, Threat Intelligence Engineer APAC, ThreatQuotient
    Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to data breach. However, it is simply impossible to patch and mitigate every software vulnerability present in an enterprise network. Despite prioritization, patching remains one of the most time-consuming vulnerability management tasks. It also has limited effectiveness because it does not take into account knowledge of how that vulnerability is actively being exploited in the wild, and the risks associated by those adversaries leveraging it to a company’s specific environment.

    In this webinar we will develop how to:
    -Visualize threat data related to the vulnerability
    -Query internal vulnerability scanning data from Tenable
    -Determine susceptible assets and prioritize vulnerability patches
    -Automatically deploy indicators to security infrastructure
  • CyberSocial: Risky Business Recorded: Sep 9 2020 56 mins
    Jonathan Couch, Host and SVP of Strategy for ThreatQuotient
    Forward-thinking organizations are finding that cyber threat intelligence (CTI) and risk management are mutually beneficial tools for grappling financial diligence and mitigation strategy requirements. Security experts and risk management executives can together create an actionable outlook using a more comprehensive understanding of threats targeting infrastructure, systems, and personnel.

    But how do these traditionally siloed teams collaborate? What can organizations do right now to use available intelligence to become more resilient and future-proof? Join us for a lively and powerpoint-free virtual panel featuring experts from Verizon, Intel 471, BreachRx, and ThreatQuotient. We’ll discuss:

    -How does supporting risk management play into the evolution of cyber threat intelligence? 

    -How can threat intelligence and risk management teams fuse their priorities and processes to help better one another?
    
-To optimize functions, what advice should threat intelligence teams consider as they provide intelligence in a different manner to risk teams?
  • Mixing Automation and Human Intelligence Recorded: Sep 3 2020 42 mins
    Joseph Blankenship, VP, Research Director Serving Security & Risk Professionals of Forrester Research, and Leon Ward, VP of P
    The increasing complexity and variety of threats, data explosion and limited resources are putting great pressure on security operations teams. Many have bought into the concept of playbooks and automation for investigation and response, but have not been able to realize the full benefits. Automation is not the end game; it is simply one part of the recipe that requires people, process and technology.
  • How to Collect and Use Internal Threat Intelligence Recorded: Aug 18 2020 30 mins
    Anthony Stitt, Regional Director APAC, ThreatQuotient Robert Streamer, Threat Intelligence Engineer APAC, ThreatQuotient
    When it comes to threat intelligence, context and relevance are paramount. The most contextually relevant threat information is based on the actual attacks an organisation faces every day. Often, organisations overlook the opportunity to leverage this internal threat intelligence, instead focusing on external threat intelligence.

    For example, many organisations now use sandboxing to detect new malware attacks, however they might only use a single SHA from the sandbox for detection or blocking. However, a typical sandbox generates tens or even hundreds of threat indicators covering a wealth of information about the malware and how it operates. These can be used for detection of previous activity that was missed at the time, or used for future detection of related intrusion attempts.

    In this webinar, we will explore some of the sources of internal threat data and how an organisation can leverage its own systems to provide the most relevant and actionable intelligence available.
  • How to Respond to Emerging Cyber Threats Recorded: Aug 11 2020 36 mins
    Ayuba "JJ" Ndiaye, Account Manager, ThreatQuotient and Syed Kaptan, Threat Intelligence Engineer, ThreatQuotient
    In today’s world, many threat intelligence providers provide free threat data to help the community outside of their existing customer base. Governments at all levels are sharing threat and adversary specific data. Data sharing via open source feeds has expanded greatly.

    Becoming aware of these new sources is one thing, but enabling users to consume, understand and enable the data in their security infrastructure and operations is a challenge.

    In this webinar, we will discuss the following:
    * How analysts can make open source threat intelligence feeds actionable
    * How a scoring and expiration policies can improve security operations automation capabilities
    * How to integrate the right threat data within your SOC tools to reduce time to detection.
  • Leveraging Threat Intelligence for Efficient Threat Hunting Recorded: Jul 28 2020 39 mins
    Anthony Stitt, Regional Director and Robert Streamer, Threat Intelligence Engineer
    Having a good Threat Hunting capability is the goal of any proactive security team. Threat Hunting means different things to different people and there are many approaches that can be taken. Threat Intelligence provides useful information to aid the Threat Hunting process. In this webinar we will demonstrate how Threat Intelligence and a well-integrated platform like ThreatQ can be used to help make the hunting process more efficient, and prioritize Threat Hunting activities.
  • CyberSocial: The Evolution of Threat Intelligence Recorded: Jul 22 2020 61 mins
    Jonathan Couch, Host and SVP of Strategy for ThreatQuotient
    For the last few years, Cyber Threat Intelligence (CTI) has evolved and matured at a rapid rate, with new feeds, internal teams, and products adjusting strategy to help compliment it’s new maturity. Hear McAfee, Atos and ThreatQuotient experts exchange their thoughts and experience around the Evolution of Cyber Threat Intelligence.
  • Making MITRE ATT&CK Actionable Recorded: Jul 14 2020 25 mins
    Anthony Perridge, VP, International and Steve Rivers, Technical Director, International
    The MITRE ATT&CK framework is becoming increasingly popular with many businesses and organizations. It provides a deeper insight into adversaries including the tactics, tools and techniques that they commonly use. Applying the MITRE ATT&CK framework effectively to your environment can be a challenge. In this webinar, we will show you how the ThreatQ platform makes it easier to apply the MITRE ATT&CK framework within your organization and more importantly, make it actionable.
  • Develop your Spear Phishing Investigation Skills Recorded: Jul 2 2020 29 mins
    Anthony Stitt, Regional Director and Robert Streamer, Threat Intelligence Engineer
    Spear phishing emails contain a wealth of hidden evidence that can be used to track and understand the methods used by attackers to target an organization. By extracting that information, analysts can better understand what to look for to identify other users that may also have been caught. A Threat Intelligence platform can assist analysts to discover associations between multiple spearphishing messages. This helps determine if a wider campaign is underway. In this webinar we will show you how to compare indicators from an email against the data in the threat library and determine the associated risk, thus allowing prioritization and noise reduction. In this webinar, you will also learn how to ingest suspicious email, extract information and then perform initial analysis, advanced investigation techniques (including victimology).
Focus on the Threat
Prioritize, automate & collaborate with a platform purpose-built for threat-centric security operations.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Respond to Emerging Cyber Threats
  • Live at: Aug 11 2020 8:00 am
  • Presented by: Ayuba "JJ" Ndiaye, Account Manager, ThreatQuotient and Syed Kaptan, Threat Intelligence Engineer, ThreatQuotient
  • From:
Your email has been sent.
or close