Detect Live March 2021 – Introduction to Collection Planning: What Intelligence Do We Need?

Live Webinar – Wednesday, March 10th 2021

8am PT | 11am ET | 4pm GMT

 

Featuring

Richard Kaufmann

CISO at Amedisys

 

AJ Nash

Sr. Director of Cyber Intelligence Strategy at Anomali

 

Jason Rivera

Director, Strategic Threat Advisory Group at CrowdStrike

 

About The Event

Join the virtual event to learn about early warning signs before a breach, guidance on threat intelligence collection planning, and demystifying cyber threat intelligence, from Amedisys, Anomali, and CrowdStrike. This virtual event will bring the community together to discuss threat intelligence challenges, requirements, and best practices.

 

Who Should Attend

This session is intended for both CXO and senior technical staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.

 

Agenda

8:00am PT Maggie Sanchez, Anomali Opening
8:05am PT Richard Kaufmann, Amedisys CISO Insights: Early Warning Signs Before a Breach
8:40am PT AJ Nash, Anomali Introduction to Collection Planning: What Intelligence Do We Need?
9:15am PT Jason Rivera, CrowdStrike Cyber Threat Intelligence Demystified: Proactively Defend Against Adversaries Targeting Your Business
9:50am PT Maggie Sanchez, Anomali Closing

 

Sessions

CISO Insights: Early Warning Signs Before a Breach

Richard Kaufmann, CISO, Amedisys

In this session, Richard Kaufmann, CISO at Amedisys will describe his current environment, journey, and the recent aggressive cyber attacks due to the pandemic. He’ll explore how he has leveraged threat intel at Amedisys as “an early warning system” against attacks and the importance of establishing threat-sharing communities. He’ll also walk through a key lesson learned on a critical topic faced by all CISOs–how to get support from your company board to do what’s necessary? Don’t miss what will surely be a lively discussion focused on what to look for in your security environment before a breach.

 

Introduction to Collection Planning: What Intelligence Do We Need?

AJ Nash, Sr. Director of Cyber Intelligence Strategy, Anomali

To successfully create an intelligence-driven cybersecurity practice we must understand our intelligence needs, create an intelligence collection plan based on those needs, and acquire the resources needed to support a successful cyber intelligence team. In this presentation, AJ Nash examines how to solve these challenges through stakeholder engagement, the authoring or adopting of intelligence requirements, selection of intelligence packages most likely to provide meaningful results aligned to those requirements, how to operationalize this unified collection capability, and metrics to capture the value of the entire intelligence program. Join us to set your collection plan and get your intelligence team on the right track.

 

Cyber Threat Intelligence Demystified: Proactively Defend Against Adversaries Targeting Your Business

Jason Rivera, Director, Strategic Threat Advisory Group, CrowdStrike

Today’s security professionals recognize that threat intelligence is a critical component in their cyber toolkit, enabling them to proactively respond and pre-empt advanced threats. Yet, many of these same professionals are having a difficult time understanding the array of threat intelligence solutions and how to best utilize them within their organizations. This session will address these challenges and highlight the importance of leveraging threat intelligence as a critical part of an effective cybersecurity strategy. Take the mystery out of cyber threat intelligence by leveraging a cyber toolkit for pre-empting advanced threats.

 

    Please complete the form below to access this research:

    Business E-mail Address

    First Name

    Last Name

    Company

    Job Title

    Company Size

    Industry

    Address

    City

    State / Province

    Zip / Postal Code

    Country

    Business Phone Number

    I would like to receive information from suppliers sponsoring this content and willing to share the information above with Anomali.

    By completing this form you agree to receive periodic email news and updates about Anomali's products and services. You can unsubscribe any time. For more information see Anomali's Privacy Policy.

    You are receiving this email on behalf of our partner Anomali. Please check the appropriate boxes below, indicating the ways in which you would like to receive communication from our third party affiliates.

    I would like to receive communication by emailI would like to receive communication by telephone

    Your privacy is a top concern for us at Knowledge Hub Media. We’ll only use your personal information to provide you with the content, products and/or services you’ve requested from us. By entering your contact information and clicking on the “submit” button below, you are confirming that you have carefully read Knowledge Hub Media’s Terms of Use agreement, and Privacy Policy, and agree to be legally bound by all such terms.

    Yes, I agree to the Terms of Use Agreement.

    Yes, I agree to the Privacy Policy.

    [group group-712]

    The third party vendor sponsoring this content may wish to contact you regarding products and/or services as they relate to this white paper/research. Please check the appropriate boxes below, indicating the ways in which you would like to receive communication from our third party affiliates:

    Yes, I would like to receive communication by email.Yes, I would like to receive communication by telephone.Yes, I would like to receive communication by postal mail.

    Knowledge Hub Media would also like to keep in touch regarding related content, white papers, business/technology research and upcoming events in your area of expertise. Please check the appropriate boxes below to opt-in:

    Yes, Knowledge Hub Media may contact me via email.Yes, Knowledge Hub Media may contact me via telephone.Yes, Knowledge Hub Media may contact me via postal mail.

    You can easily change your communication and consent preferences at any time. Opt-out of receiving communication from Knowledge Hub Media and/or our third party affiliates by easily updating your personally identifiable data and contact preferences here: Update Communication Preferences

    [/group]