Why Won’t They Listen? - ConnectingYour CTI to Decision Makers

  Рет қаралды 264

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

The best cyber threat intelligence in the world may be useless, unless it can help shape decisions at senior leadership levels. A well-written and thoroughly researched report may just end up as another task on an ever-increasing to-do list for executive leadership teams without any good effect. How can CTI better inform the critical security decisions for organizations? There is no easy answer, because organizations differ greatly in structure, knowledge, funding, and strategy. This presentation focuses on how increase the effectiveness of CTI reports, recommendations, and warnings to better inform strategic decision making in organizations. This is through a process of 'credible communication', which aims to build trust, break down barriers, and speed decision-making. Using real-life examples from over 20 years in the intelligence community, federal law-enforcement, and the Infosec community, the presenter will walk CTI professionals through the most critical part of building trust with their executive teams: how to have credible communications that build trust, rather than relying on less effective means that could leave critical vulnerabilities open for adversaries. Seeing examples from the U.S. Intelligence Community, federal law enforcement operations, and also recent information security issues such as the MGM hack in Las Vegas will provide up-to-date and relevant examples, coupled with a few stories from the lighter side of things that demonstrate that credible communication is a human endeavor, and it does not have to be robotic, boring, or an endless string of bad news.
View upcoming Summits: www.sans.org/u/DuS
SANS Cyber Threat Intelligence Summit 2024
Why Won’t They Listen? - ConnectingYour CTI to Decision Makers
Bret Irwin, Information Systems SecurityAnalyst, CGS Administrators LLC

Пікірлер
Cybersecurity is GeoPolitical: Lessons From the Fight Against Mercenary Spyware Proliferation
46:57
SANS Digital Forensics and Incident Response
Рет қаралды 837
Atomic Ransomware Emulation
33:53
SANS Digital Forensics and Incident Response
Рет қаралды 401
Scary Teacher 3D Nick Troll Squid Game in Brush Teeth White or Black Challenge #shorts
00:47
تجربة أغرب توصيلة شحن ضد القطع تماما
00:56
صدام العزي
Рет қаралды 54 МЛН
ПРОВЕРИЛ АРБУЗЫ #shorts
00:34
Паша Осадчий
Рет қаралды 1,9 МЛН
Survival skills: A great idea with duct tape #survival #lifehacks #camping
00:27
Thinking DFIRently From Entry to Specialty
1:37:51
SANS Digital Forensics and Incident Response
Рет қаралды 2,5 М.
FOR589: Cybercrime Intelligence Overview
5:47
SANS Digital Forensics and Incident Response
Рет қаралды 1,5 М.
5 highest paying careers after 12th with PCM | Student Shorts
0:59
FOR528: Ransomware & Cyber Extortion Course Overview
22:38
SANS Digital Forensics and Incident Response
Рет қаралды 826
SANS Threat Analysis Rundown (STAR)
59:41
SANS Digital Forensics and Incident Response
Рет қаралды 1,1 М.
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 79 М.
Ransomware Data Leak Sites: The Uncomfortable Truths
26:59
SANS Digital Forensics and Incident Response
Рет қаралды 197
FOR585: Smartphone Forensic Analysis In-Depth course overview
5:09
SANS Digital Forensics and Incident Response
Рет қаралды 1,1 М.
Deep Dive into Supply Chain Compromise: Hospitality’s Hidden Risks
38:13
SANS Digital Forensics and Incident Response
Рет қаралды 201
АЙФОН 20 С ФУНКЦИЕЙ ВИДЕНИЯ ОГНЯ
0:59
КиноХост
Рет қаралды 656 М.
СТРАШНЫЙ ВИРУС НА МАКБУК
0:39
Кринжовый чел
Рет қаралды 1,1 МЛН
WATERPROOF RATED IP-69🌧️#oppo #oppof27pro#oppoindia
0:10
Fivestar Mobile
Рет қаралды 19 МЛН
Как правильно выключать звук на телефоне?
0:17
Люди.Идеи, общественная организация
Рет қаралды 1,4 МЛН
iPhone socket cleaning #Fixit
0:30
Tamar DB (mt)
Рет қаралды 12 МЛН
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
VA-PC
Рет қаралды 2 МЛН