Cybercrime is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity. Cybercrime often has the advantage as it is highly motivated and not bound by the many required compliance and regulatory mandates that businesses face. Threat intelligence can be a useful ally, enriching the process of audit and assessment, and providing proof of security controls and policy enforcement that is required for security and compliance.
During this session, we will explore examples based on real world data where contextual threat intelligence is applied to data security and compliance requirements, as well as popular risk frameworks. This allows us to enrich the IT Audit process, enforce the protection of 3rd party supply chains, and prove alignment with federal regulatory requirements. Christopher Strand, Chief Risk and Compliance Officer at Cybersixgill, will further discuss how cyber threat intelligence can provide risk-based security control prioritization to enable enterprise system security, data protection, and risk assessment.
What you'll learn
Uncover what actionable Cyber Threat Intelligence (CTI) is and the critical role it plays in security and compliance policy enforcement
Implement risk-based CTI to prioritize system security gaps and enhance an organization’s security posture
Analyze the organization’s digital footprint to help predict targeted threat patterns Use CTI findings to accelerate risk assessment and data privacy adherence
Meet our speaker
Chris StrandChief Risk and Compliance Officer
Christopher Strand is the Chief Risk and Compliance Officer at Cybersixgill. He has spent the last 25 years developing business models and cutting-edge market opportunities within a broad range of IT Security businesses. He has brought value to both established industry names looking to expand their market share and to small start ups requiring differentiation to break into the market. At Cybersixgill he is responsible for leading the global security risk and compliance business unit, which helps companies and security executives bridge the gap between cybersecurity and regulatory cyber-compliance.