1. Peony 4401

Cyber threats are ever evolving. A typical organization is never short on the number of threats they face and end up playing a resource intensive catch-up game that is never ending. This reactive approach gives the threat actors an edge. They only need to find one gap to bypass the defences and compromise the victim organization. 

How could the security operations be realigned to be proactive? How could intelligence be used to forecast and mitigate threats, even before they become a concern to the organization? This session will discuss the role information sharing plays in enterprise risk management. Specifically, the speakers will discuss the importance of government/private sector partnerships and how industry specific and cross-sector information sharing complements vendor feeds in protecting a company’s IT infrastructure.

Participants: