[tforum] Fwd: [ctsc-discuss-l] CCoE Webinar Sept. 25th 11am ET: Demystifying Threat Intelligence

Joe Breen Joe.Breen at utah.edu
Mon Sep 11 09:52:50 MDT 2017

For those following security topics, please see below webinar...

The CTSC (Center for Trustworthy Scientific Cyberinfrastructure) is a NSF
CyberSecurity Center of Excellence.

 Joe.Breen at utah.edu
 Univ of Utah Center for High Performance Computing

---------- Forwarded message ----------
From: Dopheide, Jeannette M <jdopheid at illinois.edu>
Date: Mon, Sep 11, 2017 at 6:44 AM
Subject: [ctsc-discuss-l] CCoE Webinar Sept. 25th 11am ET: Demystifying
Threat Intelligence
To: "discuss at trustedci.org" <discuss at trustedci.org>, "
announcements at trustedci.org" <announcements at trustedci.org>

CCoE Webinar Sept. 25th 11am ET: Demystifying Threat Intelligence

CERN's Romain Wartel
<https://ctsc.adobeconnect.com/threatintel_092517/event/speaker_info.html> is
presenting the talk "Demystifying Threat Intelligence" on September 25th at
11am (Eastern).

Please register here
<https://ctsc.adobeconnect.com/threatintel_092517/event/registration.html>. *Be
sure to check spam/junk folder for registration confirmation with attached
calendar file.*

Threat intelligence has become a very popular keyword among security
professionals in the recent years. What is this all about? Is this a
service for sale or rather an intangible asset resulting from a trust
relationship? Every organization is seeking relevant and target
intelligence, ideally at little to no cost and yielding no false-positives.
What are the myths and realities? Is threat intelligence a worthy
investment? Is it more suitable to favor local or global sources? Are there
services or tools that can facilitate threat intelligence management.
Beyond obtaining information, an often overlooked aspect are the challenges
linked with building the ability to take promptly and effectively action
based on specific intelligence. Making good use of threat intelligence is
what makes its value, but this requires time and efforts. Yet, a
well-designed threat intelligence management and flow may in fact be the
only realistic and affordable strategy for our community to mitigate
sophisticated threats or well-funded attackers on a daily basis.

More information about this presentation is on the event page
Presentations are recorded and include time for questions with the

Join CTSC's discuss mailing list
<https://list.indiana.edu/sympa/subscribe/ctsc-discuss-l> for information
about upcoming events. To submit topics or requests to present, see our call
for presentations <https://trustedci.org/webinars-cfp>. Archived
presentations are available on our site <https://trustedci.org/webinars> under
"Past Events."


Jeannette M. Dopheide
Bro Outreach Coordinator
National Center for Supercomputing Applications
University of Illinois at Urbana-Champaign
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.uen.org/pipermail/tforum/attachments/20170911/226836f3/attachment.html>

More information about the tforum mailing list