
Gaining access to CTI is a necessary first step, but the process of vetting and leveraging it can feel somewhat overwhelming, particularly considering the volume of information that is available within some of the most prolifically-sharing industries like financial services and the defense industrial base (DIB). In this webinar, Cloppert will outline the steps network defenders must follow in order to successfully begin using CTI within their organization. The talk will begin with a brief outline of what CTI is, but the focus of this discussion will be on the ingestion, vetting, and deployment/exploitation of intelligence in furtherance of improved computer network defense. Front-line defenders/practitioners, and their immediate management alike, will want to see the steps successful organizations follow to improve the use of their CTI feeds. Methodology as well as requirements for enabling technologies will be discussed in this one-hour presentation.
Interested in more CTI? Register for the Cyber Threat Intelligence Summit taking place February 10-11, 2014 in Arlington, VA!
There are wide variety of threats that can impact your business. Enterprises need the skills, technology and processes to collect and analyze threat data and turn it into action to mitigate risks and elevate security. The Summit will bring together practitioners and experts to give you the knowledge you need to deal with the next wave of threats. View the current Summit agenda and register today.
Speaker Bio
Mike Cloppert
Michael is the lead analyst for Lockheed Martin CIRT's Intel Fusion team, charged with collecting and managing intelligence on adversaries intent on stealing the organization's intellectual property, and development of new detection and analysis techniques. Michael has worked as a security analyst in various sectors including the Financial, Federal Government, and Defense industries. He has an undergraduate degree in Computer Engineering from the University of Dayton, an MS in Computer Science from The George Washington University, has received a variety of industry certifications including SANS GCIA, GREM, and GCFA, and is a SANS Forensics and IR blog contributor. Michael's past speaking engagements include the DC3 Cybercrime Conference, IEEE, and SANS amongst various others.