Live Webinar – Wednesday, March 10th 2021
8am PT | 11am ET | 4pm GMT
Featuring
Richard Kaufmann
CISO at Amedisys
AJ Nash
Sr. Director of Cyber Intelligence Strategy at Anomali
Jason Rivera
Director, Strategic Threat Advisory Group at CrowdStrike
About The Event
Join the virtual event to learn about early warning signs before a breach, guidance on threat intelligence collection planning, and demystifying cyber threat intelligence, from Amedisys, Anomali, and CrowdStrike. This virtual event will bring the community together to discuss threat intelligence challenges, requirements, and best practices.
Who Should Attend
This session is intended for both CXO and senior technical staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.
Agenda
8:00am PT | Maggie Sanchez, Anomali | Opening |
8:05am PT | Richard Kaufmann, Amedisys | CISO Insights: Early Warning Signs Before a Breach |
8:40am PT | AJ Nash, Anomali | Introduction to Collection Planning: What Intelligence Do We Need? |
9:15am PT | Jason Rivera, CrowdStrike | Cyber Threat Intelligence Demystified: Proactively Defend Against Adversaries Targeting Your Business |
9:50am PT | Maggie Sanchez, Anomali | Closing |
Sessions
CISO Insights: Early Warning Signs Before a Breach
Richard Kaufmann, CISO, Amedisys
In this session, Richard Kaufmann, CISO at Amedisys will describe his current environment, journey, and the recent aggressive cyber attacks due to the pandemic. He’ll explore how he has leveraged threat intel at Amedisys as “an early warning system” against attacks and the importance of establishing threat-sharing communities. He’ll also walk through a key lesson learned on a critical topic faced by all CISOs–how to get support from your company board to do what’s necessary? Don’t miss what will surely be a lively discussion focused on what to look for in your security environment before a breach.
Introduction to Collection Planning: What Intelligence Do We Need?
AJ Nash, Sr. Director of Cyber Intelligence Strategy, Anomali
To successfully create an intelligence-driven cybersecurity practice we must understand our intelligence needs, create an intelligence collection plan based on those needs, and acquire the resources needed to support a successful cyber intelligence team. In this presentation, AJ Nash examines how to solve these challenges through stakeholder engagement, the authoring or adopting of intelligence requirements, selection of intelligence packages most likely to provide meaningful results aligned to those requirements, how to operationalize this unified collection capability, and metrics to capture the value of the entire intelligence program. Join us to set your collection plan and get your intelligence team on the right track.
Cyber Threat Intelligence Demystified: Proactively Defend Against Adversaries Targeting Your Business
Jason Rivera, Director, Strategic Threat Advisory Group, CrowdStrike
Today’s security professionals recognize that threat intelligence is a critical component in their cyber toolkit, enabling them to proactively respond and pre-empt advanced threats. Yet, many of these same professionals are having a difficult time understanding the array of threat intelligence solutions and how to best utilize them within their organizations. This session will address these challenges and highlight the importance of leveraging threat intelligence as a critical part of an effective cybersecurity strategy. Take the mystery out of cyber threat intelligence by leveraging a cyber toolkit for pre-empting advanced threats.