Hi [[ session.user.profile.firstName ]]

Turning Data into Threat Intelligence: A Case Study

Many security professionals find it challenging to keep up with vast amounts of data from multiple sources without hiring additional analysts to analyze it and find what’s most important. We’ll be discussing this topic in our next webcast, as we present a case study of how Open Source Intelligence (OSINT) can help you better protect your organization, and how you can turn data into threat intelligence faster.
Recorded Oct 23 2014 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Olson, James Carnall
Presentation preview: Turning Data into Threat Intelligence: A Case Study

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Phishing Prevention: Be Suspicious and Don’t Get Hooked Oct 27 2016 7:00 pm UTC 60 mins
    LookingGlass experts: James Carnall, VP, Cyber Security Center & Greg Ogorek, Sr Director, Cyber Security Operations
    Although it’s been around for years, phishing is still one of the most common and effective online scams – and it just continues to grow. In Q1 2016 alone, phishing attacks grew approximately 250 percent. There were more phishing attacks during that three-month span than any other since 2004.

    Phishing scams are increasingly difficult to detect. Using information freely available on the internet about you or your organization, cyber criminals carefully craft a message that contains real information that you are inclined to trust. It can come to you in many ways including emails, SMS messages, phone calls, or impersonating websites. Often, there is a sense of urgency that’s paired with a message that makes you react with your emotions instead of thinking. So, how do you protect yourself and your organization from phishing scams?

    Join LookingGlass cyber security experts James Carnall and Greg Ogorek as they explore the world of phishing scams and phishing protection solutions. To set the context, the diverse types of phishing scams will be outlined along with very realistic examples that make these lures come to life. Next, we will investigate the growing risks by highlighting the changing cyber threat landscape specifically attributed to phishing. We will wrap up by discussing a wide range of phishing protection solutions.
  • Operationalizing Threat Intelligence: ESG Analyst Research, Insights, Use Cases Recorded: Aug 17 2016 50 mins
    LookingGlass Cyber Solutions
    Join us to learn about recent analyst research and real-world use cases to help you better Operationalize Threat Intelligence.

    Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group (ESG), will set the stage with research results on the state of the threat intelligence market.

    Jon and A.J. Shipley, VP of Products at LookingGlass Cyber Solutions, will then dive into a lively discussion on the role of threat intelligence in incident response, securing the perimeter, supply chain management, and compromised credentials.

    Key use cases will include closing the gap in DNS, leveraging APIs for SIEM, addressing protocol-specific infrastructures, and much more.

    Sign up today to ensure you receive all the valuable insights, strategies, best practices and key use cases on operationalizing threat intelligence to help improve your organization’s cybersecurity posture and lower risk.
  • NewsWatch Review: LookingGlass - Leader in Threat Intelligence Recorded: Apr 14 2016 2 mins
    NewsWatch TV
    No matter the size, location, or type of business you have, cyber criminals are constantly looking for security gaps to exploit for the criminal’s gain. In recent years this problem has only gotten worse and it has been found to be harder to protect our information online. While investments in security increase, the paradox is that breaches continue to increase too – which affects everyone – the company, their partners, and their customers. So, it is extremely important to stay ahead of threats. LookingGlass Cyber Solutions, has become a leader in this industry, and is helping both companies and governments do just that with “threat intelligence.”

    “Just like business intelligence help organizations really optimize their business processes, threat intelligence can provide the same value to how an organization manages risk from the perspective of brand reputation and overall security operations. LookingGlass helps security teams keep their organizations safe by really allowing them to have the visibility that threat intelligence provides and not just the visibility but being able to make that operational in their processes whether that be the traditional IP security, operations set, or into other buying centers such as physical security and brand and reputation. The LookingGlass solution approach to the market is different from a lot of our competitors because we have really assembled a comprehensive portfolio that allows us to address the customer based on their maturity, so we can address customers all the way down to small novelty manufacturers up to large scale governments.” – Chris Coleman, CEO LookingGlass Cyber Solutions
  • 5 Ways to Boost Network Security with a DNS Firewall Recorded: Feb 23 2016 60 mins
    Frank Lung, Director of Product Management
    Learn how DNS firewalls enable better network protection from 1) malware, 2) spear phishing, 3) DDoS attacks, and 4) data exfiltration. Also learn how by leveraging threat intelligence, DNS firewalls can 5) mitigate threats in an even more automated, informed way.

    For example, you’ll learn that to protect from malware and data exfiltration, a DNS firewall is used to stop communication between malicious software or infected host and the malware command and control (C2) server. Without an outside connection or instructions, the malware is stopped in its tracks and ready for clean up. Or, that by adding a DNS firewall to your existing infrastructure, you can close the dangerous gap when NGFWs allow the TCP handshake to complete prior to enforcing policy. If you find these examples compelling, join us. You’ll never look at network security in the same way again.
  • Beyond Buzzwords, Part III: What Is Defense in Depth? Recorded: Dec 3 2015 55 mins
    Eric Olson, VP of Product Strategy & James Carnall, VP of Cyber Security Center
    Defense in depth is another one of those often-used, but rarely-defined, terms in Information Security circles. Sure, it means a layered defense, that’s obvious. But what makes up the layers? How do they interact for better security? And what does a best-practice implementation look like today vs. even a few years ago?
  • Beyond Buzzwords, Part II: What Exactly Is Intelligence-Led Security? Recorded: Sep 24 2015 55 mins
    Eric Olson, VP Product Strategy & James Carnall, VP Cyber Security Center
    "Intelligence-led security" is a hot topic, but what, exactly, does it mean? In this webinar, we'll define the term and provide real-life examples of what an intelligence-led security plan looks like, and how you can implement a program for your organization utilizing internal and external data.
  • Cyveillance Threat Intelligence Solutions Overview Recorded: Aug 20 2015 28 mins
    Devin Tubbs, Business Development
    Find out what open source threat intelligence is, why you need it, and how Cyveillance can protect your organization against physical and digital threats.
  • Toronto Pan American Games 2015: Assessment of the Physical Threat Environment Recorded: Jun 30 2015 16 mins
    Hans Mathias Moeller, Olga Polishchuk
    Hans Mathias Moeller and Olga Polishchuk from Cyveillance's Special Investigations Unit will discuss the upcoming 2015 Toronto Pan American Games and potential threats to the event.
  • What You Need to Know About New gTLDs Recorded: Jun 29 2015 16 mins
    Camille Stewart, Esq.
    Senior Manager of Legal Affairs, Camille Stewart, Esq., will provide a high level overview of the new gTLD program, and what consumers need to know about these new extensions to protect their brands.
  • Analysis of Phishing Attacks Using goo.gl Shortened Links Recorded: Jun 24 2015 28 mins
    Caleb Queern, Chief Scientist
    In this webinar we’ll be sharing the results of some research we just presented at the recent Anti-Phishing Working Group eCrime Symposium in Barcelona.
  • Using Open Source Threat Intelligence to Enhance Physical Security Recorded: Jun 18 2015 48 mins
    Eric Olson, VP of Product Strategy + James Carnall, VP of Cyber Intelligence
    What are the various types of open source threat data available, and how can security professionals can use it to more effectively protect organizations and executives?
  • Keeping Up to Date in an Ever-Changing Security Landscape w Threat Intelligence Recorded: Apr 9 2015 56 mins
    Eric Olson, VP of Product Strategy, Cyveillance + Haig Colter, Director of Partnerships, Centripetal
    Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
  • 2015 Information Security Trends: What's Next? Recorded: Feb 26 2015 44 mins
    Eric Olson, VP of Product Strategy
    In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • 2015 Physical Security Trends: What's Next? Recorded: Feb 25 2015 42 mins
    Michael Mullen, VP of Security Services
    In this webinar we will discuss what physical security professionals should expect in 2015. Topics will include social media, local activism, and global hotspots, among others.
  • 2015 Mobile Security Trends: What's Next? Recorded: Feb 24 2015 39 mins
    Eric Olson, VP of Product Strategy
    In this webinar, we will examine what security professionals should expect in 2015. Topics will include mobile application security, rogue mobile apps, BYOD, wearables and mobile payment systems.
  • Making the Business Case for Threat Intelligence Recorded: Dec 17 2014 56 mins
    Eric Olson, VP of Product Strategy
    In an era of advanced threats, awareness is the utmost security measure. Awareness of potential or imminent threats can enable improved preparation, and improved preparation can lead to more effective mitigation and prevention tactics. Fortunately, many outside threats, actors and methods can be detected and studied in advance through Internet monitoring and intelligence analytics. In this webinar, we’ll discuss how can security professionals make a practical case for threat intelligence.
  • Turning Data into Threat Intelligence: A Case Study Recorded: Oct 23 2014 52 mins
    Eric Olson, James Carnall
    Many security professionals find it challenging to keep up with vast amounts of data from multiple sources without hiring additional analysts to analyze it and find what’s most important. We’ll be discussing this topic in our next webcast, as we present a case study of how Open Source Intelligence (OSINT) can help you better protect your organization, and how you can turn data into threat intelligence faster.
  • Concrete Steps to Deploy an Effective Threat Intelligence Capability Recorded: Jul 16 2014 59 mins
    Eric Olson
    Protecting your business — including its information and intellectual property, physical infrastructure, employees, and reputation — has become increasingly difficult. Among thought leaders and advanced organizations, the consensus is now clear. To adequately protect company assets and ensure business continuity, organizations must be more proactive and make effective use of threat intelligence. But on a practical level, how can you do this?

    We’ll discuss practical considerations evaluating what to build and what to buy, how to define and manage the scope and mission of the Threat Intelligence program, and operate it for effect and business impact – regardless of your company size or budget.

    What you’ll learn:
    •How the business objectives define the scope and mission of the program
    •Developing metrics that support the mission and communicate value
    •How to build a spend plan and articulate budget needs
    •Build, Buy and Hybrid implementation models
    •Why skilled cyber analysts are a critical component of any program, and what skills they will need

    Register now!
  • Beyond Buzzwords: Defining Threat Intelligence and Why It Matters (Part I) Recorded: Jun 25 2014 43 mins
    Eric Olson, VP of Product Strategy
    In this webcast, the first in a two-part series, we’ll look at what defines threat intelligence, and why not knowing what it is can cost your organization and hurt your security posture.

    What you’ll learn in this webcast:
    •What characterizes true threat intelligence
    •Why what you don’t know about threat intelligence could cost you
    •How to evaluate threat intelligence solutions
  • Using Online Threat Intelligence to Assess and Predict Threats to Executives Recorded: Apr 24 2014 51 mins
    Mike Mullen, Vice President, Security Services
    Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
The Cyber Intelligence Channel
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation.

By addressing risks across structured Indicators of
Compromise (IoCs), unstructured
and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners.

Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Turning Data into Threat Intelligence: A Case Study
  • Live at: Oct 23 2014 4:00 pm
  • Presented by: Eric Olson, James Carnall
  • From:
Your email has been sent.
or close