Tag: threat intelligence practitioners’ summit
-
VB2020 TIPS presentation: Business Email Compromise – Scalable Attribution Powering Industry and Law Enforcement Collaboration
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. Business Email Compromise (BEC) is now the most…
-
VB2020 TIPS presentation: Collaborating with Competitors: A Better Strategy to Beat Adversaries
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. Threat intelligence sharing has steadily been improving over…
-
VB2020 TIPS presentations: cybercrime in the DACH region and ransomware in LATAM
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. Despite the fact that globalisation continues apace, the…
-
VB2020 TIPS presentation: Intelligence Sharing for Supply Chain Security
As part of VB2020 localhost we were proud to co-host the Threat Intelligence Practitioners’ Summit (TIPS), put together by the Cyber Threat Alliance. In a series of blog posts we highlight some of the talks presented in the Summit and the important contribution of threat intelligence sharing. As globalisation continues apace, supply chains have become…
-
VB2019 presentation: Nexus between OT and IT threat intelligence
Cyber attacks on industrial control systems (ICS) include the well-known stories of Stuxnet and BlackEnergy and such attacks appear to be getting more prevalent. Late last year, a natural gas compression facility at a US pipeline operator was targeted with ransomware . Operational Technology (OT), the mission critical IT in ICS, shares many similarities with…
-
VB2019 presentation: Building secure sharing systems that treat humans as features not bugs
There are certain paradigms that continue to permeate information security: Humans are the weakest link in security. Always assume breach. Privacy is dead. And along with these paradigms goes the tendency to lock down data. But rather than making our systems more secure this actually weakens our defences by curtailing innovation and collaboration. Andrea Limbago…
-
Programme for VB2019 Threat Intelligence Practitioners’ Summit announced
In its almost 30-year history, the Virus Bulletin Conference has evolved to become perhaps the most international threat intelligence event of the year. This is yet again reflected on this year’s conference programme, which features speakers from around the globe who will come to London to discuss the latest threats and the tools to analyse…