Cyber Threat Intelligence Summit & Training

2 9 February 2015

Currently in read only mode, sorry about that, please try again in a few hours.

Join SANS for this innovative 2-day event as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities.

Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. Advanced adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on networks over long periods of time.

Network defense techniques which leverage knowledge about these adversaries - known as Cyber Threat Intelligence (CTI) - can enable defenders to establish a state of information superiority which decreases the adversary's likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely and detailed information to continuously monitor new and evolving attacks, and methods to exploit this information in furtherance of an improved defensive posture. Make no mistake about it: contemporaneous computer network defense contains a strong element of intelligence and counterintelligence that analysts and managers alike must understand and leverage.

The goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward with cyber threat intelligence. The SANS What Works in Cyber Threat Intelligence Summit will bring attendees who are eager to hear this information and learn about tools, techniques, and solutions that can help address these needs.

4 speakers

5 sessions

Day 1 Monday 2nd February 2015

Day 2 Tuesday 3rd February 2015

Day 3 Wednesday 4th February 2015

Day 4 Thursday 5th February 2015

Day 5 Friday 6th February 2015

Day 6 Saturday 7th February 2015

Day 7 Sunday 8th February 2015

Day 8 Monday 9th February 2015

8 known attendees

  • azeez
  • akinyele ayorinde
  • Abraham
  • Okeke Uchenna Ian
  • Dr. Eric Cole
  • Eric Conrad
  • Kevin Fiscus
  • PhilHagen

8 people tracking this event

  • Anit Shrestha Manandhar
  • Melissa Millis
  • Trace Sablez
  • Scott J Roberts
  • Jim Cook
  • Martin Uher
  • Lacee Santos

Tell your friends!

Share this event with your friends on Twitter



Claimed event

This event has been claimed

Related books

  • 101 Computer Answers You Need to Know
  • Hack Proofing Your Network
  • Intuition Pumps And Other Tools for Thinking
  • Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack
  • Meaningful Use and Beyond
  • Hack This: 24 Incredible Hackerspace Projects from the DIY Movement

See something wrong?

Report an issue with this event