While the motive behind cyber-attacks can differ, the techniques are often the same. A threat intelligence program analyzes the actors, motives, techniques, and vectors of attack.
The 2016 Threat Intelligence Summit will help you create a threat intelligence program that will allow you to anticipate, detect, and respond to incidents faster and more effectively. Come hear real case studies and exchange ideas with security professionals from all industries.
Featured Keynote Speakers:
Feedback from 2015:
"Good information, entertaining speakers."
- Director of IT Operations, Albertelli Law
"Many good presentations with useful information."
- Enterprise Architect, Albertelli Law
"Relevant content and good speakers."
- ERS Manager, Deloitte & Touche LLC