Threat intelligence is an increasingly common discipline among cybersecurity companies and teams, but how does threat intelligence become actionable at scale?
Join us as we walk through how we turn threat intelligence from threat hunting team into custom detections added to EDR, SIEM and XDR tools as part of our MDR services. We will walk through examples including intelligence details, a timeline and results on how these added custom detections stop attacks.
Speakers:
Aaron May | Sr. Detection Engineer, Critical Start
David Kuder | Sr. Cyber Threat Intelligence Analyst, Critical Start
Register to watch live, or receive the recording after!
Wednesday July 27th
12PM ET | 9AM PT
5PM ET | 2PM PT
Threat intelligence is an increasingly common discipline among cybersecurity companies and teams, but how does threat intelligence become actionable at scale?
Join us as we walk through how we turn threat intelligence from threat hunting team into custom detections added to EDR, SIEM and XDR tools as part of our MDR services. We will walk through examples including intelligence details, a timeline and results on how these added custom detections stop attacks.
Fusce et arcu maximus, faucibus erat non, accumsan odio. Donec vitae semper ante, sit amet feugiat risus.
Quisque eu nibh in tortor euismod mattis id id leo. Proin malesuada vehicula nulla, id rutrum dolor fringilla in.
Quisque eu nibh in tortor euismod mattis id id leo. Proin malesuada vehicula nulla, id rutrum dolor fringilla in.
Wednesday July 27th
Morning Session
11AM ET | 8AM PT
Wednesday July 27th
Afternoon Session
5PM ET | 2PM PT
Critical Start is excited to introduce our Cyber Incident Response Team (CIRT) Domain Expert Series for business and technical professionals. The goal of these informal conversations is to provide greater visibility into today’s incident response landscape and offer tips on how to prepare for the future, using the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
Maecenas gravida mauris quis consectetur tempor. Aenean at volutpat enim. Pellentesque eu lacus vulputate, semper arcu nec, dictum felis. luctus ligula vitae ex aliquam pulvinar.
Maecenas gravida mauris quis consectetur tempor. Aenean at volutpat enim. Pellentesque eu lacus vulputate, semper arcu nec, dictum felis. luctus ligula vitae ex aliquam pulvinar.
Maecenas gravida mauris quis consectetur tempor. Aenean at volutpat enim. Pellentesque eu lacus vulputate, semper arcu nec, dictum felis. luctus ligula vitae ex aliquam pulvinar.
Data is the currency of business, and it has never been more vulnerable. Have you identified your most critical customer data? For example, what controlled data, such as GDPR, PHI, PII, is your organization handling, processing, transmitting and/or storing? Do you have a formal plan for protecting your data? If you are struggling, this session will show you how data professionals and security professionals can work together to help your business achieve remarkable outcomes.
Our special guest speakers Joe Reis and Matt Housley, co-founders of Ternary Data and co-authors of Fundamentals of Data Engineering, will review the latest data security and risk management concerns and potential ways to address those concerns. Joe and Matt will be joined by Ross Williams, our Director of CIRT and Blue Team Services, who will add context around the NIST framework and highlight data types that threat actors are targeting most often, how they are successful in compromising your data, and the impacts from vulnerabilities and risks introduced by not having the appropriate security controls in place. You will walk away from this session with a deeper understanding of how to identify your most valuable digital assets and leverage that knowledge to develop a reliable risk management strategy.