TI16 760x2002

Register before 10/9 and save $400

While the motive behind cyber-attacks can differ, the techniques are often the same. A threat intelligence program analyzes the actors, motives, techniques, and vectors of attack.


The 2016 Threat Intelligence Summit will help you create a threat intelligence program that will allow you to anticipate, detect, and respond to incidents faster and more effectively. Come hear real case studies and exchange ideas with security professionals from all industries.

Featured Keynote Speakers:

 

C.Blask 140x140 Chris Blask
 Executive Director, Cyberspace Research Institute, Webster University

 

 

 

 

 

 N.Jenkins 140x140Neil Jenkins
Chief of Policy and Planning, Department of Homeland Security, National Protection and Programs Directorate, Office of Cybersecurity & Communications

 

 

 

Feedback from 2015:

"Good information, entertaining speakers."
- Director of IT Operations, Albertelli Law

 

 

"Many good presentations with useful information."
- Enterprise Architect, Albertelli Law

 

 

"Relevant content and good speakers."
- ERS Manager, Deloitte & Touche LLC

 

 

 

2016 SPONSORS

PLATINUM SPONSORS

Anomali 200x110

Centripetal Networks 200x110

Malwarebytes 200x110 

RecordedFuture 220x150

 

GOLD SPONSORS

 

eclecticiq 200x110

esentire 200x110

ThreatQuotient 200x110

 

SILVER SPONSORS

 

BLUVECTOR 200x110

OConnorDavies 200x110

 Sixgill 200x110

 

 

MEDIA PARTNER

SearchSecurity T.Target 200x110