The Role of Threat Intelligence in Security Analytics and Operations
Compliance and legal departments are seeing more cyber threats than ever, prompting organizations to incorporate threat intelligence into their daily operations. Identifying, managing, and mitigating emerging risks—while also tracking and monitoring new adversaries and techniques within cybercrime, hacktivism, and cyberespionage—are becoming essential. But, with traditional security operations relying on alerts and incident reporting across disparate systems, managing multiple intel feeds can create a big data problem—and an isolated and fragmented perspective.
How can you get the whole picture? By unifying components such as email telemetry, next-generation firewall data, threat intelligence, endpoint logging, physical security control, and historical trending, you can get a deeper understanding of incidents and high-risk activities. Mix in human intellect, and you have actionable intelligence, increased productivity, and reduced response deltas.
This session will help you get there. We’ll give a primer on security and intelligence considerations for the legal and compliance community from corporate security, cybersecurity, and legal experts. The panel will also discuss enterprise security considerations using technology platforms to track incidents and identify emerging threats.
Rith Kem - Principal - Compliance, Forensics and Intelligence, Control Risks Jerry Finley - Director, Cyber Security, Relativity Darian Lewis - Lead Threat Intelligence Analyst, Relativity Travis Wiggins - Deputy CISO, CNA Nicolas Reys - Associate Director – Head of Cyber Threat Intelligence, Control Risks
Security in RelativityOne: How We Keep Your Data Safe
During this technical overview, you'll learn all about RelativityOne and Azure security features, and how they protect your data. Relativity's experienced security practitioners will walk you through our processes and technology for managing and maintaining access management, secure configurations, intrusion detection and prevention, encryption, and more. You'll leave with a better understanding of how to utilize cloud software to secure your environment.
Joni Musa - Advanced Software Security Engineer, Relativity Matt Spurr - Director, Product Security, Relativity Jerry Finley - Director, Cyber Security, Relativity