Join SANS for this innovative 2-day event as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities.
Featured talks and speakers include:
- Brian Krebs, renowned Data Breach and Cybersecurity journalist who first reported on the malware that later become known as Stuxnet and also broke the story on the Target will keynote the CTI Summit.
- The Most Dangerous Game: Hunting Adversaries Across the Internet, Scott Roberts, Bad Guy Catcher, GitHub and Kyle Maxwell, Senior Researcher, Verisign iDefense
- From Threat Intelligence to Defense Cleverness: A Data Science Approach, Alex Pinto, Chief Data Scientist, Niddel
- DNS As A Control Point For Cyber Risk, CEO and Chairman, Dr. Paul Vixie, Farsight Security, Inc.
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. Advanced adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on networks over long periods of time.
Network defense techniques which leverage knowledge about these adversaries – known as Cyber Threat Intelligence (CTI) – can enable defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely and detailed information to continuously monitor new and evolving attacks, and methods to exploit this information in furtherance of an improved defensive posture. Make no mistake about it: contemporaneous computer network defense contains a strong element of intelligence and counterintelligence that analysts and managers alike must understand and leverage.
The goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward with cyber threat intelligence. The SANS What Works in Cyber Threat Intelligence Summit will bring attendees who are eager to hear this information and learn about tools, techniques, and solutions that can help address these needs.
The theme of the summit in 2015 focuses on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Most organizations know what threat intelligence is, but have no real concept on how to create and produce proper intelligence. Attend this summit to learn and discuss directly with the experts who are doing the CTI analysis in their organizations. What you learn will help you detect and respond to some of the most sophisticated threats targeting your networks.
Looking forward to seeing you Feb 2-3 in Washington, DC.