Name
D6. Effective Guide to Vetting Threat Intelligence for Improved Operation
Date & Time
Wednesday, May 10, 2017, 3:15 PM - 4:15 PM
Tom Hegel
Description
Session Description:
 
The arena of cyber threat intelligence is full of new suppliers and utilization methods, some lacking the most critical requirements to transfer information and data into truly actionable intelligence. This session is for educating on the need for vetting your intelligence originating from the many suppliers, be it private or public groups, feeds, or reports. Analysts and leadership can learn how to take a proactive approach to vetting cyber threat intelligence with numerous vendor agnostic techniques to improve their outcome. 
 
 
Location Name
Room 702/704
Full Address
Colorado Convention Center
700 14th Street
Denver, CO 80202
United States
Category
Security Management
Learner Objectives
After completing this session, the learner will:
  • Educate analysts and leaderships on the importance of threat intelligence quality 
  • Understand the need for vetting cyber threat intelligence with many real world examples 
  • Identify and eliminate weak suppliers of cyber threat intelligence to improve your own program
  • Learn about free, vendor-agnostic approaches to improving your intelligence program and strengthening your team
 
Speaker Bio(s)
Tom Hegel is the Senior Threat Researcher for ProtectWise, based in Denver, CO. Tom comes from a background of incident response, security engineering and management, and security research, most recently a part of LogRhythm Labs. Tom is passionate about all things malicious with a focus on network analysis, intelligence, espionage, and eliminating FUD.
Sorting Order
5