Adversaries today are technically advanced, structured around an underground governed by market forces, and using paradigm shifts in technology to compromise more victims. Through specialization and collaboration, attackers are becoming more effective and continue to cause widespread damage, even as systems become more secure.
However, recent advances in technology provide the foundation for a new type of industry-wide threat intelligence exchange that allows potential targets to organize, collaborate, and leverage threat intelligence more effectively. In this session we examine techniques for identifying, anonymizing, and sharing threat intelligence as well as use cases where this approach can speed response times and prevent breaches.
October 22, 2014 | Theatre (Hall G) | 10:15 – 11:15