Hi [[ session.user.profile.firstName ]]

Actionable Intelligence: A Threat Intelligence Buyer’s Guide

Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

In this webinar you will learn about:
* The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
* The value of the different types and sources of internal and external threat intelligence
* How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
Recorded Sep 25 2014 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rick Holland at Forrester Research, Jeff Harrell at Norse
Presentation preview: Actionable Intelligence: A Threat Intelligence Buyer’s Guide

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Actionable Intelligence: A Threat Intelligence Buyer’s Guide Recorded: Feb 26 2015 48 mins
    Rick Holland at Forrester Research, Jeff Harrell at Norse
    Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • How I Learned to Stop Worrying and Embrace the Deep Dark Web Recorded: Dec 4 2014 47 mins
    Charles Blas, Technical Product Manager, Norse
    When people read about "Tor and the deep web" in the media, it's usually referring to the black markets selling illicit drugs, stolen credit card data, illegal weapons and more. However, increasingly Tor and other anonymous proxies are also being used to conceal threat vectors.

    This increasing use of Tor and similar technologies presents continuing challenges for IT security departments. Aside from the obvious attacks originating from the tor network, advanced malware is also using Tor to obfuscate C&C (command and control) channels, making it harder to detect, contain, and eradicate this malware in your environment.

    In this second part of our series on Tor and the deep web, we'll explore these issues and discuss strategies you can use to help mitigate the risks of such technology. Join this informative webinar to learn:

    * Three perspectives on Internet anonymity as presented from a political activist, a criminal, and an infosec professional
    * What's left of the illicit deep web marketplaces in the wake of project Onymous and what risks they really pose
    * How advanced malware is using Tor to subvert and bypass your security controls, and what you can do about it
  • Threat Intelligence - A Market for Secrets Recorded: Nov 21 2014 52 mins
    Wendy Nather-451 Research, John Masserini-MIAX Options, Sam Glines-Norse
    As the arms race escalates between attacker and defender, many organizations are looking to threat intelligence as a way to bolster the efficacy of their existing security controls, make more informed risk decisions, and prioritize their responses. As the market for threat intelligence solutions has evolved rapidly in recent years, security professionals must now consider new and different criteria to select products and services that best supports their organization's specific uses cases and business objectives.

    Join Wendy Nather of 451 Research, John Masserini, CISO of MIAX Options, and Sam Glines, CEO and co-founder of Norse for a discussion of the current state of threat intelligence market, key criteria and real world considerations for selecting solutions to protect your environment.

    In this webinar you will learn:

    * What threat Intelligence is, the different types, and the current market trends
    * Lessons learned by a financial services CISO when selecting and deploying threat intelligence in a SOC
    * The key criteria for evaluating threat intelligence solutions and services
  • TOR & the Deep Dark Web: Managing the Risks of Internet Anonymity Recorded: Oct 23 2014 57 mins
    Scott Fitzpatrick, Security Sales Architect, Norse; Anthony Bargar, Senior Security Consultant
    When faced with the challenge of identifying, understanding and mitigating network security risks, TOR and the Deep Dark Web present obstacles that are increasingly difficult to overcome. Created as a means of protecting the privacy and anonymity of its users, TOR - the managed network of private computers leveraged by criminal elements to minimize the risk of surveillance and capture - is being exploited by the most technically proficient, aggressive, and organized of criminal syndicates. TOR has emerged as a the network of choice in the Deep Dark Web for enabling illegal transactions involving weapons, drugs, stolen information, and is also often used as an anonymous communication channel for botnets advanced malware command and control (C&C).

    Join this webinar by Norse to learn:

    * What is TOR and the deep or "dark web?"
    * The primary security and business risks they pose to organizations
    * Strategies and countermeasures your organization can use to mitigate the risks
  • Actionable Intelligence: A Threat Intelligence Buyer’s Guide Recorded: Sep 25 2014 48 mins
    Rick Holland at Forrester Research, Jeff Harrell at Norse
    Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Leveraging Threat Intelligence in Security Monitoring Recorded: Aug 21 2014 54 mins
    Mike Rothman at Securosis; Jeff Harrell at Norse
    With today's advanced threats and malware evading traditional security controls at an alarming rate, the role of security monitoring has become more important than ever.

    While SIEM and big data security analytics solutions excel at the collection and analysis of an organization's internal data, enrichment of the data with external threat intelligence has proven to be a powerful solution for enabling the rapid detection of advanced malware and breaches and improving the incident response process.

    Join us for the webinar "Leveraging Threat Intelligence in Security Monitoring", featuring Mike Rothman, President and Analyst at Securosis and Jeff Harrell, Senior Director-Product Marketing of Norse, to learn about the security monitoring process and how to leverage threat intelligence for the rapid detection of advanced malware threats and improvement of the incident response process.

    In this webinar you will learn:

    * How to update your security monitoring process to integrate threat intelligence and malware analysis
    * The value of the different types and sources of both internal and external threat intelligence
    * How to score quick wins with threat intelligence, as well as creating longer term sustainable advantages
  • Widespread Compromise: Healthcare Organizations and the Internet of Things Recorded: May 13 2014 38 mins
    Barbara Filkins, SANS; Jeff Harrell, Norse
    What types of sites, endpoints and devices in the healthcare community are actually infected, stealing information and hosting other malicious activities? Attend this webinar and learn how the Internet of Things is contributing to widespread compromises in healthcare organizations from small doctor’s offices to the largest pharmaceuticals. SANS developed this healthcare cyberthreat report based on threat intelligence data gathered by Norse related to healthcare organizations in the US. The report details how healthcare organizations of all types have been compromised by successful attacks.

    Among the key findings:

    * Every type of healthcare organization was represented, from hospitals to insurance carriers to pharmaceutical companies
    * Compromised devices included everything from radiology imaging software, to firewalls, to Web cameras, to mail servers
    * A significant number of compromises were due to very basic issues such as not changing default credentials on firewalls
  • Combating Advanced Cyber Threats with McAfee and Norse DarkThreat Intelligence Recorded: May 8 2014 38 mins
    Eric Monteith, Director, Product Management, Network Threat Response and Mike Jawetz, VP of Sales Engineering, Norse
    Threat intelligence is a critical tool in the never-ending struggle to protect the world’s networks, but many threat intelligence solutions lack visibility into the parts of the Internet where bad actors operate—the darknets. As the effectiveness of these solutions declines, organizations are exposed to increased risk of security breaches, data ex-filtration, and loss of reputation and revenue from today’s advanced cyber threats.

    McAfee and Norse have developed an integrated threat intelligence approach leveraging the strengths of McAfee's Cloud Analysis and Deconstruction Service (CADS) framework with Norse’s unique ability to provide visibility into the Internet's darknets and deep web. When combined in an automated fashion with machine-to-machine interface, users now have a single-pane-of-glass with rich context to track new organizational threats not detected through traditional means.

    Join this webcast to learn about:
    •The value of Dark Threat Intelligence and its role in preventing compromise and data breaches
    •Threat intelligence-based strategies for advanced threat prevention and detection
    •Using threat intelligence to streamline and improve the incident response process
  • Exposing Malicious Threats to Health Care IT Recorded: Mar 6 2014 59 mins
    Barb Filkins at SANS; Jeff Harrell at Norse
    What types of sites, endpoints and devices in the healthcare community are actually infected, stealing information and hosting other malicious activities? Based on a study of more than six million points of presence, thousands of which belong to the healthcare industry and exhibit hostile behavior, learn more about problems in the health care industry and what can be done to overcome them, as well as other fundamental questions specific to the industry.
  • Combating cyber threats using Splunk and Norse Live Threat Intelligence Recorded: Feb 13 2014 62 mins
    Mark Seward, Sr Dir of Security & Compliance Marketing at Splunk and Mike Jawetz, VP of System Engineering at Norse
    Enriching SIEM data with external threat intelligence has proven to be a powerful solution for rapid detection of advanced malware and data breaches and improving security analysts' productivity.

    The Splunk security intelligence platform now provides a seamless, real-time integration with the Norse IPViking and Darklist live threat intelligence services enabling correlation of contextual, risk-weighted and continuously-updated threat intelligence with Splunk data.

    Together Splunk and Norse enable security professionals to react and respond in real-time to prioritized advanced threats and further reduce time from data to insight.

    Watch this webinar to learn:
    * The value of live threat intelligence and its role in preventing data breaches
    * How Splunk uses on-demand risk scoring data from Norse for determining threat severity
    * How Splunk de-duplicates threat data to reduce the noise generated by multiple threat feeds
  • SANS Analyst Webcast: SANS Survey on Securing The Internet of Things Recorded: Jan 15 2014 52 mins
    John Pescatore -Director, SANS Institute and Mike Jawetz-VP, System Engineering, Norse
    With the rapid rise of the IoT (Internet of Things), today's enterprise networks are now supporting devices that were never meant to have Internet or wireless connections. Printers, SmartTVs, HVAC and building alarms, medical instruments power control systems, refrigeration units, and even cars are all getting smarter with embedded chips and Internet or wireless connections.

    Increasingly however, researchers are revealing the weaknesses in the communications channels and embedded systems of these Things while IP addresses of embedded devices are also turning up in honeypot sensors collecting information on malware.

    Attend this Norse-sponsored SANS webcast to learn:

    * How others are managing the risks introduced by an increasing array of "smart" things with wireless or Internet connections.
    * What awareness do IT organizations have around what connected devices are being deployed, used, connected or supported in their businesses?
    * Are those devices coming under the management of IT security professionals? And if so, how they are managing them?
  • 5 Mitigation Strategies for Advanced Threats Using Live Threat Intelligence Recorded: Nov 7 2013 60 mins
    Mike Jawetz, Vice President of Systems Engineering at Norse
    It's never been more challenging to keep an enterprise secure and protected. Many traditional security controls are not keeping up with today's advanced APTs and attacks, while IT security departments face budgetary and personnel pressures. To counter advanced and zero-day threats in a sustainable way requires automation through integration of live threat intelligence with your existing systems. In this webinar Mike Jawetz, VP of Systems Engineering, of Norse will discuss the new threat landscape, how advanced botnets and malware evade detection, and 5 advanced strategies to defend against these attacks using live threat intelligence to bolster your existing controls.

    In this webinar you will learn about:
    * Changes in the threat landscape that enable advanced malware and network attacks to bypass your traditional controls
    * New techniques used by Botnets to prevent detection of their malware inside your network
    * Five live threat intelligence-based strategies to help your organization prevent compromise, data breach, and fraud from advanced attacks.
  • Beyond the Blocklist: Evaluating Next Generation Threat Intelligence Solutions Recorded: Sep 11 2013 37 mins
    Jeff Harrell, Senior Director of Product Marketing, Norse
    As cyber attacks continue to increase in frequency and sophistication, many organizations are looking to threat intelligence as a way to bolster their existing controls and systems and better protect against compromise, data breach, and losses from fraud. With a plethora of IP block lists and threat intelligence feeds available, vetting these vendors and solutions, and identifying the ones that best support an enterprise’s specific uses cases and requirements is critical.

    Additionally, as next generation threat intelligence vendors and solutions enter the market, security professionals will need to consider different criteria. In this webinar Jeff Harrell from Norse will examine the current state of threat intelligence market and detail best practices and criteria for selecting solutions
  • Hacked in 276 Seconds: Preventing Breaches with Live Threat Intelligence Recorded: Aug 22 2013 51 mins
    Dr. Larry Ponemon, Ponemon Institute and Jeff Harrell, Senior Director of Product Marketing, Norse
    Today's advanced cyber threats seem to have made a quantum leap in the past several years and are increasingly bypassing traditional security solutions, leaving organizations exposed to increased risk of security breaches, data exfiltration, loss of reputation and revenue. Join Dr. Larry Ponemon of the Ponemon Institute and Jeff Harrell, Senior Director of Product Marketing at Norse Corporation as they present new research on the value of live threat intelligence and how it can help protect organizations against today's advanced cyber threats.
Live Attack and Threat Intelligence
Norse is the global leader in live attack intelligence. Norse delivers continuously-updated and unique Internet and darknet intel that helps organizations detect and block attacks that other systems miss.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Actionable Intelligence: A Threat Intelligence Buyer’s Guide
  • Live at: Sep 25 2014 5:00 pm
  • Presented by: Rick Holland at Forrester Research, Jeff Harrell at Norse
  • From:
Your email has been sent.
or close