Day 1 | Tuesday, 30 March 2021

9:00 am - 10:00 am SGT Gaining Advanced Intelligence From Automated Response & Remediation

With limited talent available to cyber security teams, optimizing time spent on the threats that matter is of paramount importance. But simply sifting through threats doesn’t truly optimize time. Time is optimized when the team is working on exceptions offered by automated responses. 

  • Uncovering the ability to automate response
  • Realizing the goal of automated remediation
  • Procuring insights from automated remediation
  • Making forward-facing decisions based on proven automated remediation lessons learned

10:00 am - 11:00 am SGT Blending Proven Industry-Customized Data

Industry-based threat intelligence feeds have advanced significantly over the past eighteen months. There are now key sources available in myriad sectors to put cyber security experts on the same page. But for industry information, one source doesn’t mean full spectrum insight. CISOs must continue to push for new and different customized industry data.

  • Gathering industry information for your enterprise
  • Sharing enterprise threat intelligence with peers
  • Gaining blended intelligence from industry, peer-group and custom enterprise information
  • Applying that blended knowledge to ensure a thoroughly secure enterprise moving forward

11:00 am - 12:00 pm SGT Locating Company-Customized Information

While industry threat intelligence is better than ever, even multi-source industry TI isn’t customized for your particular organization. While many providers showcase customized insight, cyber security leaders have cast doubt on the veracity of those claims.

  • Surveying in-house talent to uncover and unpack previously unknown and inert in-house threat data
  • Empowering that talent to share intel with in-house peers
  • Blending advanced in-house threat data to fortify current threat intelligence
  • Sharing that advanced and fortified threat intelligence with industry peers

12:00 pm - 1:00 pm SGT Orchestrating Quality Customized Insights

Once located, customized enterprise insight puts an organization within global corporate enterprise leadership for threat intelligence. But the information is simply a tool. Having the talent on staff to realize insights from basic data is key to avoiding impactful breaches all while justifying ROI.

  • Applying traditional ROI metrics to threat intelligence
  • Conceiving of a realistic timeline for TI investment to be realized
  • Applying cogent project management of TI program to ensure deadlines are met
  • Ensuring the continued evolution of return on TI investment 

1:00 pm - 2:00 pm SGT Advancing Decision-Based Insight From TI Automation

Justified threat intelligence ROI puts an enterprise in ‘best of breed’ territory. But without advancing the intelligence throughout the organization so as to ensure cogent decision making by leadership- you TI is really just threat information or threat insight. Showcasing insights in a format in which decisions can be made is when TI truly becomes threat intelligence.

  • Understanding that intelligence is only of value when shared
  • Dashboarding TI for your enterprise stakeholders
  • Ensuring each enterprise stakeholder has only relevant actionable information
  • Consistently improving the process associated with and veracity & visibility of enterprise