WATCH ON-DEMAND
Featuring
Richard Kaufmann
CISO at Amedisys
AJ Nash
Sr. Director of Cyber Intelligence Strategy at Anomali
Jason Rivera
Director, Strategic Threat Advisory Group at CrowdStrike
About The Event
Your early warning systems can be used against cyberattacks. Spot potential threats like a CISO by watching our executive dialogue with Richard Kaufmann, CISO at Amedisys where he discussed his current environment, journey, and the recent aggressive cyber attacks experienced at his company due to the pandemic. Richard explains how threat intelligence is leveraged at Amedisys as “an early warning system” against attacks and the importance of establishing threat-sharing communities.
Establishing an intelligence-driven cybersecurity practice requires an understanding of your organization’s needs, building a collection plan, and acquiring the proper resources. In our following session, AJ Nash, Sr. Director of Cyber Intelligence Strategy at Anomali, examines how to solve these challenges through stakeholder engagement, authoring intelligence requirements, and selecting intelligence packages most likely to provide meaningful results aligned to those requirements you adopt.
Today’s security professionals recognize that threat intelligence is a critical component in their cyber toolkit, enabling them to proactively respond and pre-empt advanced threats. Yet, many of these same professionals are having a difficult time understanding the array of threat intelligence solutions and how to best utilize them within their organizations. Jason Rivera, Director, Strategic Threat Advisory Group at CrowdStrike, addresses these challenges and highlights the importance of leveraging threat intelligence as a critical part of an effective cybersecurity strategy.
Who Should Watch
This session is intended for both CXO and senior technical staff. Viewers can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.
Agenda
- Richard Kaufmann, Amedisys: CISO Insights: Early Warning Signs Before a Breach
- AJ Nash, Anomali: Introduction to Collection Planning: What Intelligence Do You Need?
- Jason Rivera, CrowdStrike: Cyber Threat Intelligence Demystified: Proactively Defend Against Adversaries Targeting Your Business