Operationalizing Threat Intelligence, Part III: Threat Modeling & Security Preparedness

Logo
Presented by

Leo Sojref, Solutions Architect for External Risk Management at Check Point

About this talk

Enterprise Security Operations teams must understand the threat landscape in which they operate: the specific threats affecting their industry and region, the threat actors who are most likely to target them, and the tactics, techniques, and procedures (TTPs) used by those bad actors. Threat Modeling helps SOC teams to shift from a theoretical understanding of the threat landscape to a more tangible analysis of the specific attacks their organization is most likely to face. In this session, Leo Sojref, Solution Architect for External Risk Management at Check Point, will discuss how to conduct strategic Threat Modeling and how it helps SOC Managers and other Information Security leaders to proactively defend against the most probable cyber attacks. By leveraging advanced cyber threat intelligence-- including an understanding of the threat groups most active in a particular sector or geographic region, as well as the TTPs and IOCs of each group-- cyber defenders can increase security preparedness, optimize defenses against the attacks they're likely to face, and reduce the risk of a major cyber incident. Join us at 10am EST / 4pm CET on Wed, Aug 13th for this 3rd session in a three-part series on Operationalizing Threat Intelligence. Part I: Continuous Monitoring & Detection is scheduled for Wed, June 18th. Register here: http://www.brighttalk.com/webcast/20101/641932 Part II: Incident Response & Threat Hunting is scheduled for Wed, July 16th. Register here: http://www.brighttalk.com/webcast/20101/641934
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (36)
Subscribers (4302)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.