The Future of Cyber Threat Intelligence

June 22, 2021

Building The CTI System Of Tomorrow

Presented by Cybersixgill & C-Vision, Re:con21 is an invite-only event that brings together thought leaders and practitioners in the world of cyber. The event will include interactive discussions around threat intelligence and risk management in order to develop methodologies and strategies to tackle the challenges of tomorrow.

June 22, 2021
Summit

Agenda

All times Pacific Standard Time (PST)
8:30 AM-9:15 AM
Vision Fireside Chat
What is Threat Intelligence & What Does it Mean to You?

Threat Intelligence is quickly becoming the epicenter of cyber security programs. From Incident response to fraud analysis, TI has become an essential ingredient in organizations’ cybersecurity tech stack. But TI means different things to different teams depending on their role, industry, and sometimes within the same organization. 


9:20 AM-10:15 AM
Keynote Panel
What Do CISOs Want to Consume on Their Dashboard?
CISOs suffer from data fatigue. They have too much information, in too many dashboards, from too many data streams. Trying to draw meaningful conclusions out of it can be sometimes impossible, resulting in a value that is not captured from the data. This session will explore new ways to bring CISOs the best answers to the right data-driven questions. The panelists will share from their experience what an ideal dashboard should include, and how it can be used to make a CISO's life easier.

10:20 AM-11:00 AM
Workshop
Building the System of Tomorrow

The primary theme of this workshop is Designing the CTI System of Tomorrow. Organizations need to understand that in 5 years they will be in a continuous stream of data breaches, and even multiple, simultaneously. If you had a magic wand and could design anything you wanted to, what would it look like? Each breakout group will brainstorm, discuss, and debate this question. 

Questions to consider:

  1. The criminal mindset: How will it evolve over time? What new actors will enter the realm? What will their profiles look like?
  2. What are the new security concerns we are going to deal with in 5-10 years?
  3. What would mitigation look like?
  4. What will be the critical assets within an organization?

11:05 AM-11:50 AM
Workshop Wrap-Up

Workshop leaders will summarize their findings and describe the capabilities of the system built. 


11:55 AM-12:25 PM
Lunch & Entertainment

12:30 PM-1:25 PM
Keynote Panel
Addressing the Cybersecurity Knowledge, Talent and Workforce Gaps

Information Security is a white-hot field. Over the last decade, it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all-time high. However, the availability of personnel with the necessary skills is sinking to an all-time low. There simply is not enough expertise to go around. In this environment, senior security leaders must express creativity in their pursuit of the people, performance, and passion necessary to address this capability shortfall. In this discussion we will also be covering how to build a network ecosystem for security leaders to exchange ideas and knowledge with each other. We'll discuss how this should be done safely and securely.


1:30 PM-1:40 PM

In Partnership With