{"id":16565,"date":"2019-10-10T10:53:26","date_gmt":"2019-10-10T18:53:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10304\/"},"modified":"2019-10-10T10:53:26","modified_gmt":"2019-10-10T18:53:26","slug":"news-10304","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10304\/","title":{"rendered":"Programme for VB2019 Threat Intelligence Practitioners&#8217; Summit announced"},"content":{"rendered":"<p>In its almost 30-year history, the Virus Bulletin Conference has evolved to become perhaps the most international threat intelligence event of the year. This is yet again reflected on this year&#8217;s conference programme, which features speakers from around the globe who will come to London to discuss the latest threats and the tools to analyse them.<\/p>\n<p>With so many threat intelligence practitioners together in one location, we think it makes sense also to focus on the issues they face in their work generating, sharing and consuming such intelligence. And thus, for the second year running, the (slightly renamed) <strong>Threat Intelligence Practitioners&#8217; Summit<\/strong> (TIPS) will take place.<\/p>\n<p>The TIPS is a one-day mini-summit that forms an integral part of the Virus Bulletin Conference: separate tickets are neither available nor required!<\/p>\n<p>In the TIPS, for which we partner with the <a href=\"https:\/\/www.cyberthreatalliance.org\/\" target=\"_blank\">Cyber Threat Alliance<\/a>, we mix a number of keynote talks with panel discussions and a fireside chat.<\/p>\n<p>In the <a title=\"Threat Intelligence Practitioners' Summit - welcome &amp; opening remarks followed by keynote: Fuelling AI with threat intelligence\" href=\"\/conference\/vb2019\/abstracts\/threat-intelligence-practitioners-summit-welcome-opening-remarks-followed-keynote-fuelling-ai-threat-intelligence\/\">first keynote<\/a>,<em> F-Secure<\/em> CTO Mika St\u00e5hlberg will discuss how machine learning and large amounts of data have changed the collection, sharing, analysis and use of threat intelligence data. Later, <em>MITRE<\/em>&#8216;s Richard Struse will discuss the both STIX 2.0 and MITRE\u2019s ATT&amp;CK Framework in <a title=\"Keynote: Technical developments in sharing \u2013 a discussion of STIX 2.0 and MITRE\u2019s ATT&amp;CK Framework\" href=\"\/conference\/vb2019\/abstracts\/keynote-technical-developments-sharing-discussion-stix-20-and-mitres-attck-framework\/\">his keynote<\/a>.<\/p>\n<p><em>Dragos<\/em> analyst Selena Larson will give a <a title=\"Keynote: Nexus between OT and IT threat intelligence\" href=\"\/conference\/vb2019\/abstracts\/keynote-nexus-between-ot-and-it-threat-intelligence\/\">keynote<\/a> on the nexus between information technology and operational technology\u00a0\u2013 something that is particularly relevant to threat intelligence related to industrial control systems. And <em>Virtru<\/em>&#8216;s in-house social scientist Andrea Limbago <a title=\"Keynote: Building secure sharing systems that treat humans as features not bugs\" href=\"\/conference\/vb2019\/abstracts\/keynote-building-secure-sharing-systems-treat-humans-features-not-bugs\/\">will discuss<\/a> how we can build sharing systems that treat humans as features rather than bugs.<\/p>\n<p>In the three panel discussions, meanwhile, threat intelligence experts from companies and organisations around the world will discuss <a title=\"Panel: How can you operationalize threat intelligence?\" href=\"\/conference\/vb2019\/abstracts\/panel-how-can-you-operationalize-threat-intelligence\/\">how threat intelligence can be operationalised<\/a>, <a title=\"Panel: Bursting the myths about threat intelligence sharing\" href=\"\/conference\/vb2019\/abstracts\/panel-bursting-myths-about-threat-intelligence-sharing\/\">what myths exist around the sharing of threat intelligence<\/a> and, to close of the summit, <a title=\"Panel: Where is threat intelligence headed?\" href=\"\/conference\/vb2019\/abstracts\/panel-where-threat-intelligence-headed\/\">where threat intelligence is heading<\/a>. (At time of writing, the details of the fireside chat are still to be confirmed.)<\/p>\n<p>Don&#8217;t forget to <a href=\"https:\/\/extranet.virusbulletin.com\/public_conference.php\" target=\"_blank\">book your ticket<\/a> for VB2019 to get access to the full three-day conference and to meet threat intelligence experts and practitioners from around the world!<\/p>\n<p><a title=\"VB2019\" href=\"\/conference\/vb2019\/\"><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/9715\/5911\/9862\/vb2019-register-now-2.jpg\" alt=\"vb2019-register-now-2.jpg\" width=\"396\" height=\"129\" \/><\/a><\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/09\/programme-vb2019-threat-intelligence-practitioners-summit-announced\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/9715\/5911\/9862\/vb2019-register-now-2.jpg\"\/><br \/>                                 In the mini-summit, which forms part of VB2019 (the 29th Virus Bulletin International Conference), eight sessions will focus on all aspects of threat intelligence collecting, using and sharing.                  <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/09\/programme-vb2019-threat-intelligence-practitioners-summit-announced\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-16565","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16565"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16565\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16565"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}