Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team (RSA Conference 2017)

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber Operations.

Detailed Presentation:

(Source: RSA USA 2017)

Speakers:

Todd Kight, Anthony Talamantes 

Todd Kight - Defensive Cyber Operations, Johns Hopkins university Applied Physics laboratory

Anthony Talamantes has over 16 years’ experience in cybersecurity operations and threat intelligence, with the last 10 years working for defense contractors. He managed the information security and incident response efforts at RAND Corporation, where he focused on cyber-defense and incident response from Advanced Persistent Threats. Talamantes joined Johns Hopkins University Applied Physics Laboratory in 2013 and is Manager of Defensive Cyber Operations, where he created intelligence and threat-based cyber-teams that specifically target advanced adversaries by blending research, threat emulation, DevOps and analytics to gain visibility in identifying advanced persistent threats.

 

 

8669813498?profile=original

Discover & Compare 1000+ Cyber Security Products (It's Free!)

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Click Here To Sign Up For FREE

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)