Proactive Cybersecurity: Modeling Adversarial Behavior

Presented by

Paul Roberts and Dan Martin

About this talk

Cyber threats are becoming more frequent and more targeted. Bad actors are more adept at social engineering and investigating your network and infrastructure to understand your organization’s cyber strengths and weaknesses. Security teams need to focus on who or what will seek to exploit them and how they are likely to do so, instead of being hyper-focused on just the threat itself. This webinar delves into how one of the world's top financial services firms developed and implemented a robust threat model capable of repelling the world's most sophisticated hackers and nation-state actors. Join LookingGlass Product Manager, Dan Martin, and Security Ledger Editor-in-Chief, Paul Roberts for an introduction to ScoutThreat™, a threat management platform that helps security analysts streamline threat analysis work and extract the maximum value from threat intelligence. In this webinar you will learn: - Advantages of modeling adversaries to get ahead of threats to your IT environment - Structuring threat models to account for a myriad of sophisticated cyber risks - How to overcome hurdles in creating robust threat models that address real-world risks - How ScoutThreat can help you build a proactive security posture

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (37)
Subscribers (6466)
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation. By addressing risks across structured Indicators of Compromise (IoCs), unstructured and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners. Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.