Security Intelligence: Predict the Predictable and Manage What’s Not

Presented by

Staffan Truvé, Co-Founder & CTO, Recorded Future & Levi Gundert, Senior Vice President Global Intelligence, Recorded Future

About this talk

During times of crisis, organizations rely on their security teams to remove layers of uncertainty to help maintain business continuity and stability. As operations teams scramble to empower remote workers, opportunistic attackers are doubling down on their efforts. Now more than ever, security teams must emphasize risks over threats. Integrating predictive intelligence into the core of your security strategy is the best way to measure, communicate, and mitigate risk during times of great change — while proactively preparing for what’s next. On Thursday 11th June at 9:00 AM ET / 2:00 PM BST, Recorded Future Co-Founder and CTO Staffan Truvé, joined by Senior Vice President of Global Intelligence Levi Gundert, will present “Predict the Predictable and Manage What’s Not,” a live webinar outlining: oWhat we can learn from 20 plus years of failed security paradigms exacerbated during times of uncertainty oHow a risk-based approach can help security teams maximize resources and amplify impact — with a focus on maintaining profitability oRecorded Future research on vulnerability exploits and threats linked to geographies and industries impacted by the COVID-19 crisis

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (120)
Subscribers (19266)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user