Roundtable 1: Coen Bongers, Head IT Security at AMINA Bank AG
Threat Intelligence and Best Practices: Prevent, Detect, and Enrich Security IncidentsIn the dynamic landscape of cybersecurity, threat intelligence plays a pivotal role in safeguarding organizations. This roundtable discussion delves into the integration of Threat Intelligence data with the SIEM/SOAR technology stack in a SOC, to identify and mitigate security threats. We explore how threat intelligence informs the SOC Incident lifecycle, from prevent, to Detect and Enrich.
Join us to unravel the synergy between threat intelligence and effective incident response, bridging the gap between anticipation and action.
Roundtable 2: Peter Hladky, Founder at cybensis GmbHFrameworks and Methodologies for Intelligence Production
The main objective of intelligence is to provide actionable information to aid the decision making process (whether it is on the strategic, tactical, operational or technical level). Different frameworks and methodologies existed before the dawn of the cyber domain and due to the growing prevalence of network intrusions within this domain new ones came to existence in recent years: Intrusion Kill Chains, MITRE ATT&CK, Diamond Model to name a few.
Let us discuss the different frameworks and methodologies for intelligence production, practical experiences with their applications, their suitability and advantages/limitations. This roundtable is aimed at the whole spectrum (strategic, tactical, operational, technical) of practitioners (producers and consumers) involved in the intelligence cycle with the objective to learn from our unique experiences.
Roundtable 3: Nicolas Krassas, Head of Threat & Vulnerability Management at HenkelThreat Intelligence, proactive measures and advance team building
I would like to discuss a different approach on CTI, where instead of only waiting for TI companies to deliver data, one will proactively research, monitor trends, and build internal teams that can spot threats in the business landscape before these will be used by actors.
Roundtable 4: Florian Wüst, Cyber Defense Consultant at Migros-Genossenschafts-BundThreat intelligence-driven security (T.I.D.S) in the Trenches: A Roundtable on Lessons Learned and Real-World Impact
Threat intelligence-driven security (T.I.D.S) holds immense potential for proactive defense. This roundtable invites professionals from Cyber Security Teams, CSIRT, threat hunting, SOC operations, and security engineering to share their frontline experiences with implementing T.I.D.S.
We'll dive into:
- Successes and Triumphs: where has T.I.D.S made a tangible difference in your team's work?
- Challenges and Roadblocks: what obstacles did you face when integrating T.I.D.S, and how were they overcome?
- Insights for Practitioners: share your key takeaways for making T.I.D.S work effectively within your domain.
- Cross-Team Collaboration: how can T.I.D.S improve communication and workflows across security teams?
- Sharing Best Practices: what strategies have you found successful for disseminating intelligence to relevant stakeholders?
Join this interactive discussion to glean practical insights, learn from your peers, and shape the future of threat intelligence-driven security.