Top 7 talks for 'Threat Intelligence' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more than 45,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes, sessions and debates focused on New Attack Technique, Encryption, Artificial Intelligence, Machine Learning, Internet Of Things, Cloud Security & Virtualization & many more.

(Source: RSA Conference USA 2017)

1) Your Sector Doesn’t Matter:  Achieving Effective Threat Prioritization

Speaker: John Hultquist, John Miller

Many organizations’ security functions determine what threats they care about based on what threats are known to be affecting their sector, or comparably simple criteria. In reality, this approach is poorly suited to dealing with the significant security issues of today. Malicious actors scope their victims based on multiple factors, and understanding these factors is essential to managing risk.

>> Go to presentation

2) Au Natural: Adventures in NLP  and Threat Intel

Speaker: Adam Meyers

In July 2016, Google released their Cloud Natural Language API; multilingual entity extraction sounded like a fun thing to play with and it was cheap. This led to a series of experiments to derive a usable prototype for NLP integration with threat intelligence. This presentation will explore the use of NLP in Threat Intel and demonstrates findings from its use against the Virus Total platform.

>> Go to presentation

3) Opening the Door to DoD Perspectives  on Cyber Threat Intelligence

Speaker: Ron Carback

Cyberthreats are growing in volume and variety. It is critical for the security industry to understand how to help DoD improve its cyber-intelligence. Defense Intelligence Officer for Cyber, Mr. Carback, will share DoD imperatives that will baseline your understanding of the actors, their intent and impact, the role of cyber-intelligence in DoD, and how we can partner together.

>> Go to presentation

4) Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team

Speakers: Todd Kight, Anthony Talamantes

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber Operations.

>> Go to presentation

5) Weaponizing Intelligence: Interdiction in Today’s Threat Landscape

Speaker: Matthew Olney

The threat environment is evolving every single day. As adversaries find more efficient and effective ways of making money they will reinvest that money to create more advanced and evasive malware. Disrupting that economy is key. This talk will focus on moving from gathering threat intelligence toward providing consistent offensive threat interdiction.

>> Go to presentation

6) Intelligence-Led Security: Powering the Future of Cyber-Defense

Speaker: Marshall Heilman

A new class of intelligence-led security is powering the future of cyber-defense, driven by deeper and broader visibility into the attacker ecosystem. This session will look at how intelligence is influencing the development of security products/services and how defenses will benefit from the integration of data from across IT/security operations with insights on the evolving threat landscape.

>> Go to presentation

7) A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts

Speaker: Dan Plastina

Despite the positive advancements in machine learning and intelligence, security professionals remain overwhelmed. How is it that we keep wasting time and energy on analyzing and assembling the information presented by our supposedly “intelligent” solutions? This session will explore a conjoint approach that would help our industry climb out of the sea of data that is most certainly going to drown us.

>> Go to presentation


8) (FREE ACCESS) FireCompass : Discover & Compare 1000+ Global Sec...

Description: AI Assistant For Security Product Buying

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Claim Free Account


Your Complete Guide To Top Talks @RSA Conference 2017 (USA)

Get your FREE Guide on Top Talks @ RSA Conference 2017 (USA) . Our editorial team has gone through all the talks and handpicked the best of the best talks at RSA Conference into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Views: 270

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

Forum

Security Trends and Emerging Technologies That A CISO Should Adopt In 2021

Started by Priyanka Aash Mar 3. 0 Replies

What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2021   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */