TI16 760x2002

While the motive behind cyber-attacks can differ, the techniques are often the same. A threat intelligence program analyzes the actors, motives, techniques, and vectors of attack.

The 2016 Threat Intelligence Summit will help you create a threat intelligence program that will allow you to anticipate, detect, and respond to incidents faster and more effectively. Come hear real case studies and exchange ideas with security professionals from all industries.

Featured Keynote Speakers:

 

C.Blask 140x140 Chris Blask
 Executive Director, Cyberspace Research Institute, Webster University

 

 

 

 

 

 N.Jenkins 140x140Neil Jenkins
Chief of Policy and Planning, Department of Homeland Security, National Protection and Programs Directorate, Office of Cybersecurity & Communications

 

 

 

Feedback from 2015:

"Good information, entertaining speakers."
- Director of IT Operations, Albertelli Law

 

 

"Many good presentations with useful information."
- Enterprise Architect, Albertelli Law

 

 

"Relevant content and good speakers."
- ERS Manager, Deloitte & Touche LLC

 

 

 

2016 SPONSORS

PLATINUM SPONSORS

Anomali 200x110

Centripetal Networks 200x110

Malwarebytes 200x110 

2 1 large color1x 4

ThreatConnect 200x110

GOLD SPONSORS

Blueliv 200x110

esentire 200x110

DomainTools 200x110

Flashpoint 200x110

NSS Labs 200x110

Phishme 200x110

ThreatQuotient 200x110

 

SILVER SPONSORS

 

BLUVECTOR 200x110

eclecticiq 200x110

OConnorDavies 200x110

Sixgill 200x110 2 

EDUCATION PARTNERS

ISSA International 200x110


NolaSec 200x110

SearchSecurity T.Target 200x110