Beyond detection: Transforming threat intelligence into actionable attack surface reduction

Tuesday
 
26
 
November
1:35 pm
 - 
2:15 pm

Speakers

Loris Minassian

Loris Minassian

Founder & CEO
CyberStash

Synopsis

In today's ever-evolving threat landscape, organizations face constant challenges in defending against opportunistic attacks. Despite advancements in cybersecurity measures, breaches continue to occur, highlighting the need for proactive defense strategies. In this presentation, we will delve into the critical role of threat intelligence in fortifying organizational defenses and mitigating the risk of opportunistic attacks.

But beyond that, we will explore how network analytics can enhance these efforts by enabling organizations to hunt, pivot, and detect Advanced Persistent Threats (APTs) and targeted attacks, even in scenarios where there is no previous threat intelligence data.

1. Understanding the Threat Landscape:

  • Overview of prevalent opportunistic attack vectors.
  • Discussion on the persistent challenge of breaches despite existing cybersecurity measures.

2. The Role of Threat Intelligence:

  • Recognizing the pivotal role of threat intelligence in defending against opportunistic attacks.
  • Addressing the challenges of operationalizing threat intelligence, including resource constraints and integration difficulties.
  • Exploring strategies to make threat intelligence actionable and seamlessly integrate it into existing security operations.

3. Best Practice Framework for Threat Intelligence and Network Analytics:

  • Introduction to the Access, Aggregation, Automation, and Hunting framework for effective threat intelligence operations.
  • Exploration of best practices for leveraging both technologies to maximize security effectiveness and efficiency.

4. Enhancing Defense with Network Analytics:

  • Introduction to network analytics and its role in proactive defense.
  • Discussion on how network analytics can complement threat intelligence by enabling organizations to hunt, pivot, and detect APTs and targeted attacks.
  • Examples showcasing the effectiveness of network analytics in identifying and mitigating threats in near-real-time.

5. Lowering Exposure and Detecting Unknown Threats:

  • Practical approaches to leveraging tactical threat intelligence and network analytics to lower organizational exposure.
  • Demonstration of how network analytics can be used to detect and respond to unknown threats, filling gaps where there is no previous threat intelligence data.

Throughout the presentation, emphasis will be placed on practical strategies and best practices that organizations can implement to strengthen their cybersecurity posture and effectively defend against opportunistic threats and targeted attacks.

By leveraging both threat intelligence and network analytics, organizations can proactively identify and mitigate threats, even in the absence of prior intelligence data, ensuring comprehensive protection in today's dynamic threat landscape.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country