Threat Intelligence Summit

Virtual Security Events

SecurityWeek’s Threat Intelligence Summit is a virtual conference that will allow attendees from around the world to immerse themselves in a virtual world to explore and discuss the latest trends and insights on cyber threat intelligence (CTI).

Diamond Sponsor

Recorded Future

In the modern enterprise managing both direct- and cloud-hosted resources, identity for your users is much more complicated than a directory record. A comprehensive IAM strategy should cover all the resources your business relies on regardless of where they are, and it is this challenge that the zero-trust methodology is meant to address. Join Duo's Advisory CISO Wolfgang Goerlich for a focus session on zero-trust principles, where they can be applied in both local and hosted environments, and what to consider when planning your identity and access management strategy.

What’s the best approach to enterprise security? The prevailing consensus in the industry has generally been threat-based or compliance-based approaches. However, many organizations that use these approaches struggle to strike the right balance between technical tools and practical outcomes.

The answer is to focus on reducing risk.

In this keynote presentation, Recorded Future’s senior vice president of global intelligence, Levi Gundert, provides an actionable roadmap for success and shares key takeaways from his newly released book, “The Risk Business: What CISOs Need to Know About Risk-Based Cybersecurity.”

Attendees will:

Examine 20 plus years of security paradigms — and learn why many of them fail
Explore the increasing risks tied to digital transformation initiatives
Understand how security intelligence helps teams make better decisions based on contextual data and metrics
Discover a proven, comprehensive framework for cybersecurity that emphasizes risk over threats
Learn how to create a persistent information advantage for better security — with a focus on being profitable

Please visit the virtual expo hall and explore the virtual conference center to learn and compete to win prizes, including a NEW 13" MacBook Pro!

Before joining Flashpoint, Director of Risk Intelligence Strategy Mike Smola led Walmart’s Data Assurance and Cyber Intelligence team and has more than 25 years of experience building and leading security teams. Joined by Chris Camacho, Flashpoint Chief Strategy Officer, Mike will discuss developing and building an intelligence program, covering:

• Decisions on scope with a focus on leveraging your intelligence team’s skills to support decision making
• Identifying true risk to your business such as stock prices, sales, and bottom-line profits
• Hiring differently to support a broad scope of functions, e.g. operations, fraud investigations, privacy, legal, marketing, and supply chain
• Leveraging vendors as business partners and challenging them to adapt to your specific needs
• Adopting a more holistic mindset around intelligence
• Information sharing and how this practice can help facilitate better outcomes for your program

Tuning your SOC to Effectively Hunt Threats

Threat hunting is no longer a luxury, but a necessity. The sheer volume of threats and the capacity for malware to lurk undetected warrants a program and skillset that proactively reduce time to detection and mitigate business risk. The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.
In this session, we’ll discuss:
How to assess your Threat Hunting maturity
How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
How to manage YARA rules and local Threat Intelligence to expose hidden threats, and
How to create an Early Warning System to identify threats before they have a chance to proliferate
In this session, we’ll discuss:
How to assess your Threat Hunting maturity
How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
How to manage YARA rules and local Threat Intelligence to expose hidden threats, and
How to create an Early Warning System to identify threats before they have a chance to proliferate

Cyber-attacks are becoming stealthier, faster, and more complex. Investigating and triaging these threats takes time, and human analysts just can’t keep up - but AI can.  Join Justin Fier, Darktrace’s Director of Technology, as he deep-dives into Darktrace’s Cyber AI Analyst - a ground-breaking innovation that has revolutionized the investigation and analysis of cyber-threats. The Cyber AI Analyst combines expert analyst intuition with the speed and scale AI for the first time.

Please visit the virtual expo hall and explore the virtual conference center to learn and compete to win prizes, including a NEW 13" MacBook Pro!

Recorded Future arms security teams with the only complete security intelligence solution powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context in real time and packaged for human analysis or integration with security technologies.

Join us for a live demo focused on our browser extension, Splunk integration, indicator look-ups, and more during the SecurityWeek's Threat Intelligence Summit:
Integrate unprecedented, real-time security intelligence into your SIEM or SOAR to enhance your existing workflows
View risk lists on IPs, domains, hashes, and malware to enable fast threat detection and response
Position unprecedented, real-time intelligence over any web-based SIEM, vulnerability solution, security blog, or webpage
Enrich IOCs to with elite security intelligence to reduce false positives, increase analysts’ “speed to no,” and accelerate investigations

The world is shifting left. Agile is everywhere. Business is moving at breakneck speed. So why are we still using cold-war methodologies when it comes to intelligence? It doesn’t matter how you define threat intelligence, the bottom line is that it must be based on hard data; it must be predictive, not reactive.
Today’s security organizations simply cannot effectively manage the huge amount of data points they need to digest. Whether you are a financial institution trying to cope with the constantly increasing volumes of leaked credit cards, a hospital looking to patch its critical vulnerabilities or an enterprise hoping to prevent the next data breach - the current approach is becoming more obsolete by the minute.
In this session, Omer Carmi, VP of Intelligence at Sixgill, will discuss the common pitfalls that many organizations face, and share a new approach to consider, that may solve these challenges:
How does automated collection give you an exclusive, real-time sneak peek into the darkest corners of the underground?
How can you direct your security team to better leverage their time? How can you increase analysts’ and security teams’ performance and confidence - fast?
Why is preemptiveness key when it comes to your security organization, and how do the feeds you use fuel its impact?

With malicious domain registrations on the rise, it is more important than ever to have context around indicators from your own network as you tackle them in your TIP / SOAR / SIEM. Join DomainTools Senior Sales Engineer Taylor Wilkes-Pierce to explore the benefits of leveraging DNS and infrastructure OSINT collected at scale in the SOC.

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers security without cumbersome and antiquated technologies. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.

Diamond Sponsor

Platinum Sponsors

Gold Sponsors


Event Details
Sponsors