A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Threat Intelligence - A Program Strategy Approach - Jenn Black Converge 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Threat Intelligence - A Program Strategy Approach
Jenn Black
jennrblack

Adding threat intelligence as a component of an existing enterprise security program requires methodical adoption and well-defined goals to increase security's effectiveness in handling new and existing threats. From Accuvant-Fishnet's extensive research, we have developed a threat intelligence process model which incorporates leading practices at various maturity levels. It is flexible enough to be adopted at any stage of maturity, while prescriptive enough to provide direct strategic and operational guidance.

Jennifer Black is a seasoned global security program manager with more than 15 years of industry experience. Currently, Black serves as solutions research analyst for the Office of the CISO at Accuvant, which recently merged with FishNet Security to create the nation's premier cyber security solutions provider. In this role, she conducts primary and secondary research with the goal of creating security programmatic guidance that provides insight and direction to security leaders. Previously, Black held a variety of program management, business development, proposal development, and technical writing positions at global organizations such as HP Enterprise Security Services, Fujitsu, Cisco Systems, Capital One Mortgage, Verizon and Dr. Pepper. Black holds a bachelor's degree from Excelsior College and expects to receive her MBA in international business from Texas A&M Commerce in summer 2015.

Back to Converge 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast