Trends & Evolution
Facebook Twitter LinkedIn

Trends & Evolution

Combined Session
Tuesday, November 13, 2018 15:10—16:10
Location: Carl von Gontard

Panel - Cyber Threat Intelligence Best Practices

In some cases, more data and information does not necessarily result in more clarity. In this session we will discuss the difference between more information and real intelligence. We will hear about the successful implementations of Cyber Threat Intelligence. 

Mike Hart
Mike Hart
FireEye
As Vice President Central Europe Mike Hart is responsible for all sales activities across the German speaking markets and Eastern Europe. This includes partnerships with both customers and...
Ammi Virk
Ammi Virk
Hexegic B.V. 
Ammi Virk has worked within law enforcement services for over 20 years. He has worked domestically in the UK and internationally in Europe, Africa and the Middle East. He has...
Aviram Zrahia
Aviram Zrahia
Juniper Networks
Aviram Zrahia is a cybersecurity evangelist at Juniper Networks, and a research fellow in the Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel-Aviv University. His primary research...

Contextualising Cyber Threat Intelligence

Cyber Threat Intelligence is a hot topic. So much so, that attacks are constantly in the news and most medium to larger companies / organisations will have had some level of consultancy or internal development of a response or strategy.

Ammi and John will use their experience as Intelligence Professionals to draw parallels with other types of crime and how contextualising Cyber Threat Intelligence enables the provision of wider [holistic] uses, including operational, tactical and strategic.

The presentation will use general examples of issues / problems to highlight the need to know the context of incidents, how the context can be derived from intelligence and the benefits. These include:

-          Sources before resources

-          Frameworks for intelligence resource and application development

-          Application of effective intelligence analysis

-          Forward looking proportionate responses

-          Development of intelligence products leading to;

-          Proportionate response

The presentation will conclude with a summary of their thoughts and ideas. 

Contextualising Cyber Threat Intelligence
Presentation deck
Contextualising Cyber Threat Intelligence
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
John Unsworth
John Unsworth
Revak
John Unsworth is an experienced and charismatic speaker.Throughout his career John has delivered key note presentations throughout the UK and internationally as a subject matter expert...
Ammi Virk
Ammi Virk
Hexegic B.V. 
Ammi Virk has worked within law enforcement services for over 20 years. He has worked domestically in the UK and internationally in Europe, Africa and the Middle East. He has...
Subscribe for updates
Please provide your email address