Detect LIVE March – MITRE ATT&CK and Threat Intel as a Cornerstone of Critical Infrastructure Detection and Response Strategy

Detect LIVE – March 2022
 
Wednesday, March 23, 2022

8am PT | 11am ET | 4pm GMT


Featuring:

Joe Ariganello

Vice President of Product Marketing, Anomali


Robert Sanchez

Senior Director, Threat and Sharing Analysis, Anomali


Sergio Caltagirone

Vice President of Threat Intelligence, Dragos


About The Event

Join the virtual event to learn about MITRE ATT&CK and Threat Intel as a Cornerstone of Critical Infrastructure Detection and Response Strategy from Dragos and Anomali. This virtual event will bring the community together to discuss threat intelligence challenges, requirements, and best practices.

 

Who Should Attend

This session is intended for both CXO and senior technical staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their environments.


Agenda

8:00am PT Joe Ariganello, Anomali: Opening

8:05am PT Joe Ariganello, Anomali | Roberto Sanchez, Anomali | Sergio Caltagirone, Dragos: Q&A Discussion

8:35am PT Roberto Sanchez, Anomali: The Power of Cyber Threat Intelligence Together with MITRE ATT&CK

9:10am PT Sergio Caltagirone, Dragos: Prioritize and Strengthen Your Cyber Defense with MITRE ATT&CK and Threat Intel

9:45am PT Joe Ariganello, Anomali: Closing


Sessions

Q&A Discussion

Roberto Sanchez, Anomali | Sergio Caltagirone, Dragos | Joe Ariganello, Anomali
New attacker techniques, trends across attacker groups, and extended detection and response (XDR).


The Power of Cyber Threat Intelligence Together with MITRE ATT&CK

Roberto Sanchez, Senior Director, Threat and Sharing Analysis, Anomali
MITRE ATT&CK has practical and strategic applications across various security functions when security tooling and processes are mapped to the framework. Visualizing threats through the MITRE ATT&CK framework makes it easier for security practitioners to determine and communicate the highest priority threats they face and optimize actions to mitigate them. Gain a strategic advantage through key programmatic benefits of MITRE ATT&CK and combine tools for a more secure environment.


Prioritize and Strengthen Your Cyber Defense with MITRE ATT&CK and Threat Intel

Sergio Caltagirone, Vice President of Threat Intelligence, Dragos
The key to building stable infrastructure is understanding how to utilize threat intelligence to maximize limited resources to protect and defend against industrial cyber threats. Join this session with Sergio Caltagirone, Vice President of Dragos Threat Intelligence. He’ll discuss integrating threat intelligence with the MITRE ATT&CK knowledge base to prioritize defensive actions and strengthen your defensive cybersecurity measures.

The presentation will provide an in-depth exploration of the MITRE ATT&CK Framework and answer how it helps prioritize industrial cybersecurity efforts. Sergio will then explain the integration of threat intelligence with your broader cyber defense programs to focus on the most critical threats. The presentation will conclude with examples of practical threat intelligence usage.

    Please complete the form below to access this research:

    Business E-mail Address

    First Name

    Last Name

    Company

    Job Title

    Company Size

    Industry

    Address

    City

    State / Province

    Zip / Postal Code

    Country

    Business Phone Number

    By completing this form you agree to receive periodic email news and updates about Anomali products and services. You can unsubscribe any time. For more information see the Anomali Privacy Policy.

    You are receiving this email on behalf of our partner Anomali. Please check the appropriate boxes below, indicating the ways in which you would like to receive communication from our third party affiliates.
    I would like to receive communication by emailI would like to receive communication by telephone

    Your privacy is a top concern for us at Knowledge Hub Media. We’ll only use your personal information to provide you with the content, products and/or services you’ve requested from us. By entering your contact information and clicking on the “submit” button below, you are confirming that you have carefully read Knowledge Hub Media’s Terms of Use agreement, and Privacy Policy, and agree to be legally bound by all such terms.

    Yes, I agree to the Terms of Use Agreement.

    Yes, I agree to the Privacy Policy.

    The third party vendor sponsoring this content may wish to contact you regarding products and/or services as they relate to this white paper/research. Please check the appropriate boxes below, indicating the ways in which you would like to receive communication from our third party affiliates:

    Yes, I would like to receive communication by email.Yes, I would like to receive communication by telephone.Yes, I would like to receive communication by postal mail.

    Knowledge Hub Media would also like to keep in touch regarding related content, white papers, business/technology research and upcoming events in your area of expertise. Please check the appropriate boxes below to opt-in:

    Yes, Knowledge Hub Media may contact me via email.Yes, Knowledge Hub Media may contact me via telephone.Yes, Knowledge Hub Media may contact me via postal mail.

    You can easily change your communication and consent preferences at any time. Opt-out of receiving communication from Knowledge Hub Media and/or our third party affiliates by easily updating your personally identifiable data and contact preferences here: Update Communication Preferences

    Comments are closed.