Panel: Where is threat intelligence headed?

Thursday 3 October 15:00 - 15:30, Small talks

Derek Manky (Fortinet)
Samir Mody (K7 Computing)
Heather King (CTA)
Warren Mercer (Cisco Talos)



Everyone knows cyber threats evolve rapidly, in both nature and scope. This trend will almost certainly continue, so how does the cybersecurity market need to evolve and change? Yet, it will not be enough for these changes to come in the private sector alone; the involvement of governments and not-for-profit entities will be critical in delivering the pace of adaptation necessary to match up to adversaries. This panel, representing a diverse mix of sectors and perspectives, will examine where they believe the threat landscape is heading, exemplified by specific use cases and observations, before turning to what most be done in the face of that change.


(This presentation forms part of the Threat Intelligence Practitioners’ Summit)

 

Derek-Manky-web.jpg

Derek Manky

Derek Manky plays a strategic and visionary role in consulting with leading CSOs/CISOs of Fortune 500
companies worldwide across multiple industries. He also collaborates with global forums and expert groups alongside leading political figures, key policy stakeholders and law enforcement, including the Cyber Threat Alliance (CTA), NATO, INTERPOL, and FIRST.

 

Samir-Mody-web.jpg

Samir Mody

Samir Mody is the VP of Threat Research at K7 Computing. He graduated from the University of Oxford in 2000 with a first-class Master’s degree in chemical engineering, economics and management. Immediately after graduation he joined Sophos, UK, where he spent over nine years, the latter three of them as Threat Operations Manager at SophosLabs. Since August 2010 he has been the Lead of the Threat Control Lab at K7 Computing’s headquarters in Chennai. He has actively contributed to the IEEE Taggant System project and other IT security industry initiatives such as AMTSO, including contributing to its seminal Testing Standards. He has co-authored and/or presented papers and participated in panel discussions at various international IT security conferences including EICAR 2006, VB2010/VB2013/VB2015, AVAR 2010-12, AVAR 2015. He has been instrumental in the creation of K7 Academy, a cybersecurity training division of K7 Computing. Samir’s personal interests include reading (philosophy, politics, history, literature, and economics), sport and classical music.

 

Heather-King-web.jpg

Heather King

Heather King works to improve the cybersecurity of our digital ecosystem by working with companies and organizations to share information and coordinate with one another. She has held senior roles for cybersecurity policy at the U.S. National Security Council (NSC) and other federal agencies, including serving as the Acting Senior Director for Cybersecurity Policy. Prior to that, Heather served on the NSC staff in several roles from April 2013 to April 2017, including Deputy Executive Secretary and Director of Critical Infrastructure Cybersecurity. Before joining the NSC staff, she served in a variety of roles at the Federal and state levels. Heather holds Master's degrees in global security from Virginia Tech and in management of information technology from the University of Virginia.

 

Warren-Mercer-web.jpg

Warren Mercer

Warren Mercer joined Cisco Talos coming from a network security background, having previously worked for other vendors and the financial sector. Focusing on security research and threat intelligence, Warren finds himself in the deep, dark and dirty areas of the Internet and enjoys the thrill of the chase when it comes to tracking down new malware and the bad guys! Warren has spent time in various roles throughout his career, ranging from NOC engineer to leading teams of other passionate security engineers. Warren enjoys keeping up to speed with all the latest security trends, gadgets and gizmos; anything that makes his life easier in work helps!

@SecurityBeard

 



Back to VB2019 Programme page

Other VB2019 papers

Panel: Bursting the myths about threat intelligence sharing

Kathi Whitbey (Palo Alto Networks)
Jeannette Jarvis (Fortinet)
Dan Saunders (NTT)
John Fokker (McAfee)

Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly

Lilang Wu (Trend Micro)
Moony Li (Trend Micro)

Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

Michael Raggi (Proofpoint)
Ghareeb Saad (Anomali)

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.