Introduction to Cyber Threat Intelligence
12.30 to 14.00 15th September 2021
Join Ian Thornton-Trump a/k/a Phat hobbit to hear how Cyber Threat Intelligence could help your organisation to reduce the risk of the cyber threat.
Information on impactful attacks is out there just waiting to be collected and used to protect your organisation from malicious actors - even at a nation state level. Ian will provide case studies and hands on examples of how to plan, collect, process, analyse, and disseminate cyber threat intelligence products for an organisation or Managed Service Provider. Ian has been a military intelligence analyst, a criminal intelligence analyst for the RCMP and set up CTI programs for two large enterprises Amtrust International & Ladbrokes Coral Group here in the UK.
1 - How to Identify key assets in your organization.
2 - How to build threat models to determine your organizational risk.
3 - How to Build a CTI program to provide early warning of impactful attacks
The DEW Line was the northernmost and most capable of three radar lines in Canada and Alaska. It was set up to detect incoming bombers and missiles of the Soviet Union during the Cold War, and provide early warning of any sea-and-land invasion. The Mid-Canada Line (MCL) was proposed as an inexpensive solution using a new type of radar.
This provided a "trip wire" warning located roughly at the 55th parallel, giving commanders ample warning time, but little information on the targets or their exact location. The MCL proved largely useless in practice, as the radar return of flocks of birds overwhelmed signals from aircraft! The DEW Line was proposed as a solution to both of these problems, using conventional radar systems that could both detect and characterise an attack, while being located far to the north where they would offer hours of advanced warning. This would not only provide ample time for the defences to prepare, but also allow the Strategic Air Command to get its active aircraft airborne long before Soviet bombers could reach their targets. This story makes the perfect analogy for understanding the challenges of cyber threat intelligence.
Ian is an ITIL certified IT professional with 25 years of experience in IT security and information technology. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013.
After a year with the RCMP as a Criminal Intelligence Analyst, Ian worked as a cyber security analyst/consultant for multi-national insurance, banking and regional health care.
Today, as Chief Information Security Officer for Cyjax UK Ltd., Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cyber security consultant specializing in cyber threat intelligence programs for small, medium and enterprise organizations. In his spare time, he teaches cyber security and IT business courses for CompTIA as part of their global faculty. As a founder and CTO of Octopi Managed Services Inc. in Canada, Ian continues to comment and write on IT security challenges and opportunities to international acclaim.
After registering, you will receive a confirmation email containing information about joining the meeting.