Threat Intelligence And Dynamic Risk Management
Examining the next era of security and the CISOs role in risk managementAdd bookmark
Threat intelligence can be used in a myriad of different ways to counter an attack; during incident response to speed up the investigation, in predicting attacks and monitoring third parties, and in making decisions on long-term cyber security protocol. A few years ago, threat intelligence was just for elite security professionals, but nowadays it’s available for everyone to use.
That is why Dennis Leber is ‘taking the stage’ at Cyber Security Hub’s Digital Summit, to simplify the process for using the right tools and solutions for your organization. Attendees who join will better “understand the benefits of threat intelligence … and if they are already traveling down that road — use the data as a checkpoint on their progress,” according to Leber.
Leber started his Information Security career in the military and has since worked in the automotive, healthcare, federal government and finance industries as an information security leader. He currently serves as the Chief Information Security Officer at the Cabinet for Health and Family Services (CHFS) for the Commonwealth of Kentucky.
See Related: “Member Spotlight: Dennis Leber, CISO, CHFS – Kentucky”
Leber will leverage his background and experience to help attendees learn how to:
- Turn threat intelligence data into actionable, contextual information.
- Assess different threat intelligence tools.
- Implement and prove ROI for your investment.
“Start with clear goals and desired outcomes, align with the business for success, and learn all you can about threat intelligence,” advises Leber, who also has a passion for information security and igniting that same passion in others to create future leaders. He has taught information security courses at different colleges and speaks regularly at conferences and group events.
Dynamic Risk Management For The Evolving Threat Landscape
Leber will also be joining a panel discussion on dynamic risk management for the evolving threat landscape. As companies become more digital, hackers more sophisticated and companies grow and change in strategy; it's time to re-examine your risk framework and see if it’s a fit for 2019.
See Related: “Cyber Security Challenges, Focuses 2019”
Now more than ever cyber security professionals are being asked to get involved in risk management, building and delivering a risk-based portfolio strategy (including prevention, response, mitigation, insurance and measurement) and determining how cyber security plays into each risk. In this session, Leber will join Steve Lavergne, Principal Security Consultant for Bank of Canada, to discuss best practices when it comes to changing risk management. Leber and Lavergne will explore:
- The CISOs role in risk management.
- Assessing the maturity of your risk and cyber security framework.
- What new risks do you need to incorporate into your framework?
“Risk assessments are a key tool in securing systems and applications, as new risks are identified (i.e. through threat intelligence). Completing the risk assessment process enables the business leaders in making decisions on addressing these risks,” says Leber.
His top tips include: “Adopt a risk management framework such as the NIST RMF, dedicate resources to the program, and demonstrate that the risk management program enables the business.”
About The Cyber Security Digital Summit
Uniting cyber security professionals and thought leaders from across the world online for two days of free sessions, the Digital Summit delivers practical business tips, top challenges and solutions as they relate to enterprise security.
High-tech artificial intelligence, behavioral analytics and autonomous solutions mean that our arsenal is full when facing new threats. However innovative tools that can be used to prevent attacks can similarly be used by criminals against the enterprise, meaning that understanding and harnessing cutting-edge technology is vital to surviving.
Cyber Security Hub has united experts from every aspect of this space to present their most compelling case studies and real-world advice on subjects ranging from artificial intelligence, incident response, secure enterprise mobility, phishing, behavioral analytics, identity & access management and more. By the end of the event, you will have been provided with the tools you need to build a “360 plan” for your enterprise.
Join us over two days in May to learn from world-class cyber-security experts and share best practices with peers to help build a more robust cyber-security network without leaving your desk:
To view the Digital Summit sessions ON DEMAND, click here.