Early-bird Discount
expires in
Register Now

Agenda

Actionable Threat Intelligence

Actionable Threat Intelligence

Session
Wednesday, December 04, 2024 12:15—13:15
Location: Satellit

Cyber Threat Intelligence: Misconceptions to Avoid
12:15—12:35
 

Large organizations invest substantial resources in Cyber Threat Intelligence (CTI) tools and staffing, yet many remain discontented with the outcomes, feeling that significant gaps still exist. Why is this the case? With numerous vendors offering a wide array of CTI solutions, is the problem rooted in the technology and tools themselves, or do misconceptions about CTI adoption lead to inefficiencies?

This talk will explore the key misconceptions that often undermine CTI efforts in organizations, shedding light on why the expected results frequently fall short. By addressing these misunderstandings, we will provide insights into optimizing CTI strategies for more effective and actionable intelligence.

Patrick Shirazi
Security Advisor
Swedbank
Patrick is a passionate Security Advisor and Security Researcher whose work is pivotal in safeguarding the financial sector and enhancing the overall security of society. With a career spanning...
PANEL: Turning Data into Defense: The Art of Actionable Threat Intelligence
12:35—12:55
 

This panel explores the critical role of actionable threat intelligence in modern cybersecurity. Industry experts will discuss strategies for transforming raw data into meaningful insights, leveraging advanced technologies like AI and machine learning to enhance threat detection and response. Panelists will share best practices for integrating actionable intelligence into security operations, addressing challenges in information sharing, and improving organizational resilience against evolving cyber threats.

Matt Calligan
Director of Incident Response and Threat Sharing Markets
ArmorText
Matt Calligan is the Director of Incident Response and Threat Sharing Markets for ArmorText and for nearly a decade, has helped critical infrastructure industries establish and build threat sharing...
Osman Celik
Analyst
KuppingerCole
Osman joined KuppingerCole as Research Analyst in March 2022. Osman holds a Bachelor of Business Administration degree from Koc University, Turkey, and Master of Management (Track in IT Management)...
Navroop Mitter
CEO
ArmorText
Navroop Mitter is the CEO and founder of ArmorText. Before founding ArmorText, Navroop was a senior manager at Accenture’s North American Security Practice, specializing in governance, risk,...
Patrick Shirazi
Security Advisor
Swedbank
Patrick is a passionate Security Advisor and Security Researcher whose work is pivotal in safeguarding the financial sector and enhancing the overall security of society. With a career spanning...
Looking behind the curtain: Does your systems authenticate and authorize as you’d expect?
12:55—13:15
 

The increasing popularity of the term “Identity Security”, coupled with the explosive growth in the number of  identity security vendors, bears testament to the fact that security starts and often ends with identity. But with so many tools, so many processes moving part making up the modern identity fabric, do you really know what is really happening behind the curtain and inside all that IAM infrastructure?  Accounts are created, entitlements are assigned, users authenticate, access is authorized and data is accessed.  This process not only happens for the standard users coming in through a nicely federated, passwordless authentication solution, but also for your admins, your agents and the service accounts they leverage. The very process of IAM is happening across all of your infrastructure, from legacy applications to cloud services and beyond into IaaS and the SaaS services you subscribe to. But when something changes in that flow, the configuration for an IdP or a relying system changes, or an update is made to profile configuration, orchestration flow or group assignment - will you identify the change, understand its meaning and forecast its overall risk to your identity security posture?  Are you instrumented for the future state of IAM?

In his talk, KuppingerCole Fellow Analyst Darran Rolls, former CISO and CTO at SailPoint, will outline how Identity instrumentation and orchestration technology can help reverse-engineer the authentication and authorization flow of applications and provide key insights into configuration and usage.  He will explain how the future state of IGA, ITDR, and overall Identity Security must deliver instrumentation to allow visibility, configuration and usage information for all applications and will highlight how emerging technologies can help fill this gap.

Darran Rolls
Research and Advisory Fellow
KuppingerCole / Cloud 10
Mr. Darran Rolls is a research and advisory Fellow at KuppingerCole and an independent consulting advisor. He has a long history in Identity Management and Security at companies...
Almost Ready to Join the cyberevolution 2024?
Reach out to our team with any remaining questions
Get in touch