Your Sector Doesn’t Matter:  Achieving Effective Threat Prioritization

Your Sector Doesn’t Matter:  Achieving Effective Threat Prioritization ( RSA Conference 2017)

Many organizations’ security functions determine what threats they care about based on what threats are known to be affecting their sector, or comparably simple criteria. In reality, this approach is poorly suited to dealing with the significant security issues of today. Malicious actors scope their victims based on multiple factors, and understanding these factors is essential to managing risk.

Detailed Presentation:

(Source: RSA USA 2017)


John Hultquist, John Miller

John Hultquist leads the analysis team that tracks cyberespionage threats for FireEye's government and commercial clients. His team has uncovered dozens of cyberespionage operations including publicly known operations such as the Russian Sandworm hackers who carried out attacks on the Ukrainian grid. He has over eight years experience covering cyberespionage and hacktivism, working in senior intelligence analysis positions at the US government prior to iSIGHT Partners and FireEye. Before working in the cyber-realm, he worked with the ISACs and was involved in counterinsurgency operations with the US Army.

John Miller, with FireEye’s iSIGHT Intelligence unit, leads a team which provides actionable intelligence on financially-motivated cyberthreat activity. In this role, Miller directs analysis on topics such as credential theft malware, payment card abuse, ransomware, money laundering and mobile device threats. Miller and his team regularly work with diverse organizations to help them better understand and manage the threats they face. Prior to this role, Miller has worked in analytical roles focused on multiple others issues, such as distributed denial-of-service (DDoS) threats and South America-based malicious activity.


Pre Register For SACON -  India's First Security Architecture Confe...

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

Views: 91

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform


Security Trends and Emerging Technologies That A CISO Should Adopt In 2021

Started by Priyanka Aash Mar 3. 0 Replies

What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

Follow us

Contact Us


Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2021   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */