Past Meetup

Threat Intel in a Nutshell & Detecting the Undetectable with Illusive Networks

This Meetup is past

109 people went

Location image of event venue

Details

***This Event is FREE***

Join us this evening to network and learn about how you can get started with your own threat intelligence program by only using OpenSource tools and how our sponsor Illusive Networks is stopping Advanced Threats by detecting the undetectable.

5:30-6:10PM – Networking & Socializing (Food & Drinks Provided)

6:10 – 6:20PM - Introduction from Organizers and Sponsors

6:20 - 7PM - Guest Speaker: CCS Organizer, Abdel Sy Fane
Session Title: Threat Intelligence in a Nutshell: From Intelligence to Exploitation (Live Exploitation Demo)
Q&A + Short Break

7:10 - 8PM - Guest Speaker from Illusive Networks: Ken Sigel

Session Title: Stop Lateral Movement by Detecting the Undetectable
Q&A

8:00PM - Networking

Speaker Bio: Abdel Sy Fane
Abdel is a lead application security engineer at Allstate and president of the Chicago CyberSecurity (CCS) organization. With over five years of experience in security and ten years in the IT industry, Abdel is passionate about a wide range of security topics, including Threat Intelligence, DevSecOps, and Artificial Intelligence and security integration. He received his master’s in Cyber Forensics & Security from Illinois Institute of Technology in 2014, and since then he has consulted for the Veteran’s Administration, PayNet and Allstate. As president of CCS, Abdel is dedicated to unifying the security community and promoting security education.

www.linkedin.com/in/abdelsyfane

Abstract:
Getting started with a threat intelligence program doesn’t have to be costly or time consuming, with some automation anyone can jump start their own threat program. Today, we see a lot of enterprises heavily investing in a threat intelligence program to gain informational advantage over their adversaries (bad-actors) in other to prevent threats their organizations faces but we don’t see the same trend for small organizations. Traditionally, starting a threat intel program not only requires a team of experts but also the technology to produce the data but today, that is no longer the case. With a little coding knowledge, anyone can join the OpenThreat community and consolidate a list of OpenSource threat intel tools to collect intelligence and take automated actions to remediate the threat. During this talk, we will go over how we can exploit systems from a single threat intelligence.

Speaker Bio:
Ken Sigel is a Principal Systems Engineer with Illusive Networks. Over the past 20 years, Ken has held several pre-sales and management positions at HyTrust, FaceTime, Proofpoint, and ZL Technologies where he helped customers solve security and compliance problems related to access controls, encryption, key management, email security. He gained insight into his customer’s security and compliance pains while managing similar problems working for a global pharmaceutical company. Ken studied Mechanical Engineering at the University of Nevada, established a consulting company to help small businesses set up local networks and create their Internet presence, and is a contributor to several publications including, Building Trust and Compliance in the Cloud.