Hi [[ session.user.profile.firstName ]]

Making the Business Case for Threat Intelligence

In an era of advanced threats, awareness is the utmost security measure. Awareness of potential or imminent threats can enable improved preparation, and improved preparation can lead to more effective mitigation and prevention tactics. Fortunately, many outside threats, actors and methods can be detected and studied in advance through Internet monitoring and intelligence analytics. In this webinar, we’ll discuss how can security professionals make a practical case for threat intelligence.
Recorded Dec 17 2014 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Olson, VP of Product Strategy
Presentation preview: Making the Business Case for Threat Intelligence
  • Channel
  • Channel profile
  • Bigger Isn't Always Better: Assessing Cyber Risk to Reduce Your Attack Surface Recorded: May 10 2017 52 mins
    Eric Olson, VP of Intelligence Operations, and James Carnall, VP Cyber Security Center
    Ransomware, spear phishing and third party breaches have become a huge problem as organizations become more connected online and expand their cyber footprint. When even the largest and most
    sophisticated global organizations, government agencies, and multinational banks are routinely penetrated and taken offline by cyber criminals, how can a concerned enterprise quickly and cost-effectively evaluate their own risk?

    During this webinar, Vice President of Intelligence Operations, Eric Olson, and VP of Cyber Security Center, James Carnall, will discuss how organizations can evaluate their internal and third party cyber risk to:

    · Minimize your attack surface for increased visibility
    · Make smarter and more cost-effective investments in your security posture
    · Proactively look for potential leaks, theft of sensitive data or other holes in your security posture
  • Assessing Targeted Attacks in Incident Response Threat Correlation Recorded: Apr 12 2017 52 mins
    Allan Thomson, CTO, and Jamison Day, Principal Data Science Engineer
    The current number of active cyber threats is astounding. Do you know which threats are targeting you right now and which threats are likely to cause greatest harm to your company?

    This session examines how correlating network flow data with cyber threat information during incident response provides knowledge of not only what threats are active or targeting you, but which of your assets are being targeted before or during an incident. We examine the many data types used in commonly-shared indicators of compromise and explore which provide for automating correlation with network flow data. The pros and cons of common correlation algorithms are discussed with a focus towards their contributions and limitations to enhancing threat intelligence efforts. Proper network flow correlation should provide a foundation for performing risk-based mitigation that identifies the threats that are creating the greatest loss of value for your organization rather than chasing down the threats deemed most harmful by the industry.
  • How Are You Managing Cyber Risk From Your Third-Party Relationships? Recorded: Mar 30 2017 42 mins
    Ryan Curran, Senior Sales Engineer
    Outsourcing and strategic partnerships have become a staple in today's business climate, enabling organizations to drive business value and stay ahead of the competition. However, moving company information outside of its own defense perimeter opens an organization up to a myriad of cybersecurity vulnerabilities. Organizations need to have the tools and resources to determine the risk from 3rd party relationships and manage that risk in a timely and consistent manner.

    In this webinar, Senior Sales Engineer Ryan Curran will help you learn how to:
    ~ Identify and monitor threats targeting your extended ecosystem
    ~ Use a threat intelligence platform for third-party risk management workflows
    ~ Leverage Threat Indicator Confidence Scoring and pre-packaged threat intelligence to start monitoring 3rd parties within minutes
  • Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Recorded: Feb 28 2017 37 mins
    Kinshuk Pahare, Director of Product Development, LookingGlass
    The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.

    Join our Director of Product Management, Kinshuk Pahare as he discusses the:
    1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
    2. Importance of having high quality threat intelligence.
    3. Must-have characteristics of a Threat Intelligence Gateway appliance.
  • Building a Threat Intelligence Program Recorded: Nov 17 2016 61 mins
    Mike Rothman and AJ Shipley
    Security teams continually look for better ways to collect, analyze, and apply threat intelligence. Join our webcast with industry experts Mike Rothman and A.J. Shipley in their lively discussion of building, optimizing, and getting more value from your threat intelligence program. They’ll explore:

    •Evaluating data quality
    •Understanding threat context, relevance and priority
    •Key use cases around threat prevention, detection, and remediation
    •Best practices and advanced tools & technologies.
  • Phishing Prevention: Be Suspicious and Don't Get Hooked Recorded: Nov 3 2016 56 mins
    James Carnall and Greg Ogorek
    Although it’s been around for years, phishing is still one of the most common and effective online scams – and it just continues to grow. In Q1 2016 alone, phishing attacks grew approximately 250 percent. There were more phishing attacks during that three-month span than any other since 2004.

    Phishing scams are increasingly difficult to detect. Using information freely available on the internet about you or your organization, cyber criminals carefully craft a message that contains real information that you are inclined to trust. It can come to you in many ways including emails, SMS messages, phone calls, or impersonating websites. Often, there is a sense of urgency that’s paired with a message that makes you react with your emotions instead of thinking. So, how do you protect yourself and your organization from phishing scams?

    Join LookingGlass cyber security experts James Carnall and Greg Ogorek as they explore the world of phishing scams and phishing protection solutions. To set the context, the diverse types of phishing scams will be outlined along with very realistic examples that make these lures come to life. Next, we will investigate the growing risks by highlighting the changing cyber threat landscape specifically attributed to phishing. We will wrap up by discussing a wide range of phishing protection solutions.
  • Operationalizing Threat Intelligence: ESG Analyst Research, Insights, Use Cases Recorded: Aug 17 2016 50 mins
    LookingGlass Cyber Solutions
    Join us to learn about recent analyst research and real-world use cases to help you better Operationalize Threat Intelligence.

    Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group (ESG), will set the stage with research results on the state of the threat intelligence market.

    Jon and A.J. Shipley, VP of Products at LookingGlass Cyber Solutions, will then dive into a lively discussion on the role of threat intelligence in incident response, securing the perimeter, supply chain management, and compromised credentials.

    Key use cases will include closing the gap in DNS, leveraging APIs for SIEM, addressing protocol-specific infrastructures, and much more.

    Sign up today to ensure you receive all the valuable insights, strategies, best practices and key use cases on operationalizing threat intelligence to help improve your organization’s cybersecurity posture and lower risk.
  • NewsWatch Review: LookingGlass - Leader in Threat Intelligence Recorded: Apr 14 2016 2 mins
    NewsWatch TV
    No matter the size, location, or type of business you have, cyber criminals are constantly looking for security gaps to exploit for the criminal’s gain. In recent years this problem has only gotten worse and it has been found to be harder to protect our information online. While investments in security increase, the paradox is that breaches continue to increase too – which affects everyone – the company, their partners, and their customers. So, it is extremely important to stay ahead of threats. LookingGlass Cyber Solutions, has become a leader in this industry, and is helping both companies and governments do just that with “threat intelligence.”

    “Just like business intelligence help organizations really optimize their business processes, threat intelligence can provide the same value to how an organization manages risk from the perspective of brand reputation and overall security operations. LookingGlass helps security teams keep their organizations safe by really allowing them to have the visibility that threat intelligence provides and not just the visibility but being able to make that operational in their processes whether that be the traditional IP security, operations set, or into other buying centers such as physical security and brand and reputation. The LookingGlass solution approach to the market is different from a lot of our competitors because we have really assembled a comprehensive portfolio that allows us to address the customer based on their maturity, so we can address customers all the way down to small novelty manufacturers up to large scale governments.” – Chris Coleman, CEO LookingGlass Cyber Solutions
  • 5 Ways to Boost Network Security with a DNS Firewall Recorded: Feb 23 2016 60 mins
    Frank Lung, Director of Product Management
    Learn how DNS firewalls enable better network protection from 1) malware, 2) spear phishing, 3) DDoS attacks, and 4) data exfiltration. Also learn how by leveraging threat intelligence, DNS firewalls can 5) mitigate threats in an even more automated, informed way.

    For example, you’ll learn that to protect from malware and data exfiltration, a DNS firewall is used to stop communication between malicious software or infected host and the malware command and control (C2) server. Without an outside connection or instructions, the malware is stopped in its tracks and ready for clean up. Or, that by adding a DNS firewall to your existing infrastructure, you can close the dangerous gap when NGFWs allow the TCP handshake to complete prior to enforcing policy. If you find these examples compelling, join us. You’ll never look at network security in the same way again.
  • Beyond Buzzwords, Part III: What Is Defense in Depth? Recorded: Dec 3 2015 55 mins
    Eric Olson, VP of Product Strategy & James Carnall, VP of Cyber Security Center
    Defense in depth is another one of those often-used, but rarely-defined, terms in Information Security circles. Sure, it means a layered defense, that’s obvious. But what makes up the layers? How do they interact for better security? And what does a best-practice implementation look like today vs. even a few years ago?
  • Beyond Buzzwords, Part II: What Exactly Is Intelligence-Led Security? Recorded: Sep 24 2015 55 mins
    Eric Olson, VP Product Strategy & James Carnall, VP Cyber Security Center
    "Intelligence-led security" is a hot topic, but what, exactly, does it mean? In this webinar, we'll define the term and provide real-life examples of what an intelligence-led security plan looks like, and how you can implement a program for your organization utilizing internal and external data.
  • Cyveillance Threat Intelligence Solutions Overview Recorded: Aug 20 2015 28 mins
    Devin Tubbs, Business Development
    Find out what open source threat intelligence is, why you need it, and how Cyveillance can protect your organization against physical and digital threats.
  • Toronto Pan American Games 2015: Assessment of the Physical Threat Environment Recorded: Jun 30 2015 16 mins
    Hans Mathias Moeller, Olga Polishchuk
    Hans Mathias Moeller and Olga Polishchuk from Cyveillance's Special Investigations Unit will discuss the upcoming 2015 Toronto Pan American Games and potential threats to the event.
  • What You Need to Know About New gTLDs Recorded: Jun 29 2015 16 mins
    Camille Stewart, Esq.
    Senior Manager of Legal Affairs, Camille Stewart, Esq., will provide a high level overview of the new gTLD program, and what consumers need to know about these new extensions to protect their brands.
  • Analysis of Phishing Attacks Using goo.gl Shortened Links Recorded: Jun 24 2015 28 mins
    Caleb Queern, Chief Scientist
    In this webinar we’ll be sharing the results of some research we just presented at the recent Anti-Phishing Working Group eCrime Symposium in Barcelona.
  • Using Open Source Threat Intelligence to Enhance Physical Security Recorded: Jun 18 2015 48 mins
    Eric Olson, VP of Product Strategy + James Carnall, VP of Cyber Intelligence
    What are the various types of open source threat data available, and how can security professionals can use it to more effectively protect organizations and executives?
  • Keeping Up to Date in an Ever-Changing Security Landscape w Threat Intelligence Recorded: Apr 9 2015 56 mins
    Eric Olson, VP of Product Strategy, Cyveillance + Haig Colter, Director of Partnerships, Centripetal
    Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
  • 2015 Information Security Trends: What's Next? Recorded: Feb 26 2015 44 mins
    Eric Olson, VP of Product Strategy
    In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • 2015 Physical Security Trends: What's Next? Recorded: Feb 25 2015 42 mins
    Michael Mullen, VP of Security Services
    In this webinar we will discuss what physical security professionals should expect in 2015. Topics will include social media, local activism, and global hotspots, among others.
  • 2015 Mobile Security Trends: What's Next? Recorded: Feb 24 2015 39 mins
    Eric Olson, VP of Product Strategy
    In this webinar, we will examine what security professionals should expect in 2015. Topics will include mobile application security, rogue mobile apps, BYOD, wearables and mobile payment systems.
The Cyber Intelligence Channel
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation.

By addressing risks across structured Indicators of
Compromise (IoCs), unstructured
and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners.

Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Making the Business Case for Threat Intelligence
  • Live at: Dec 17 2014 6:00 pm
  • Presented by: Eric Olson, VP of Product Strategy
  • From:
Your email has been sent.
or close