Interop ITX 2017 Schedule Viewer

Collecting, Correlating & Analyzing Security Data

Interop ITX 2017 Schedule Viewer

Use this interactive agenda to get an overview of our ever-growing conference program and to sort sessions by pass type, track, day/time, and speaker. Many more sessions will be added in the weeks to come.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Collecting, Correlating & Analyzing Security Data

    Speakers:
    Location:  TBD
    Format: Conference Session
    Conference Journeys: Business/Data Analyst
    Track: Security
    Pass Type: All Access, Conference - Get your pass now!
    Vault Recording: TBD
    Audience Level: Business/Data Analyst

    Organizations have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT, news media, and bosses knocking on the door saying "should we be worried about this." The amount of data can be overwhelming, and it's only effective if you know how to use it. How do you correlate this information to identify the cyberattacks that are most important to yourorganization right now? The key is in the context, and seeing the data at hand in terms of the bigger picture.

    "Threat Intel" isn't a buzzword - it's how your organization finds the relevance in its threat data and then puts strategy in action to stop increasingly complex exploits before they result in a data breach or worse. In this session, you'll obtain tips and best practices for collecting, correlating, and analyzing threat information and learn how to recognize and respond to the most important threats with time on your side.