Threat Intelligence and Sharing – Southern Chapter Best Practices

Explore best practices on how Southern Chapter Members are gathering Threat Intelligence and how they approach sharing that intelligence

About this Event

Threat intelligence (TI) is becoming more important and a popular feature in information security programs. Whether organisations have a full TI team, ingest threat feeds, or simply leverage TI features found in common security tools, they are now benefiting from TI in one way or another.

The 2019 Ponemon Study, The Value of Threat Intelligence , indicates that 85% of organizations consider threat intelligence critical to achieving a strong security posture.

Our next South Chapter meeting will explore, through a combination of panel speakers followed by audience participation, best practices on how Southern Chapter Members are both gathering Threat Intelligence and how they approach sharing or accessing that intelligence, including:

  • Custom developed solutions being used to gather TI
  • Commercial TI platforms available and how they are used.
  • Examples of the latest product development, e.g. using Machine Learning to gather TI
  • Information resources used to stay current on TI and TI sharing organisations
  • TI from both a software and hardware perspective and different sectors

After the presentations, there will be an opportunity for attendees to share their approaches to gathering TI and how they approach sharing or accessing that intel. The discussions will explore how can we improve TI amongst South Chapter members, e.g. sharing best practices, setting up a working group, etc.

Speakers

  • Moderator – Emer O’Neill, VMWare
  • Ken Moussat, Security Engineer, VMware
  • Alieeldin Mady, Secure Lab, Qualcomm
  • Andy Grzess, CTO Smarttech247

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.