This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
November 2018 ISSA Web Conference

ISSA Thought Leadership Series: The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence

Recorded (1 Hour Event) on Wednesday, November 7, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don't even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.

In this webinar, you will learn:

How security professionals go about sourcing indicators
What can you do with IOCs/IOAs after locating valuable indicators
To pivot through threat actor infrastructure and determine the "Who" and the "How Bad".



C-A Washington, Founder and President, Image & Etiquette Institute

Chanel-Alexandria “C-A” Washington is the founder and president of the Image & Etiquette Institute, a personal image and organizational branding firm dedicated to empowering clients using Appearance, Relationships, and Credibility to achieve their most important goals. Prior to becoming an author, speaker, and trainer, C-A served in numerous leadership roles in both state and federal government agencies, as well as in the private sector.  C-A is an associate of the Georgia Chapter of the National Speaker’s Association, Emily Post Institute trained business etiquette trainer, former board member of the Association of Image Consultant’s International - DC Chapter, and alumna of the Harvard Kennedy School’s Women and Power program.  With her experience and expertise, C-A specializes in helping leaders and teams convey excellence with civility, style, and charm because she firmly believes that with the right techniques and habits, we can all communicate with confidence and connect more authentically. 


Taylor Wilkes-Pierce, Sales Engineer, Domain Tools

Taylor Wilkes-Pierce, Sales Engineer at DomainTools has over 10 years of experience in technology sales with stops at Verizon, Amazon, and Virtuozzo along the way to DomainTools. Although Taylor loves all things infosec, he has a fond spot for container virtualization, software defined storage, and basketball.


Greg Reith, Sr. Solutions Architect, CenturyLink

Greg Reith began his career with U.S. Army Special Forces with a specialty in Operations and Intelligence. Greg’s experience includes counter intelligence, intelligence analysis and collection at both tactical and strategic levels. At the end of his career in the military, he transitioned into Information Technology and was the Information Systems Security Officer responsible for securing Special Operations classified and unclassified networks.
 Prior to CenturyLink, Greg led the T-Mobile threat intelligence team and developed the T-Mobile threat intelligence strategy and capability. Throughout his career Greg has worked for or consulted to organizations to include federal agencies, state agencies, multi state lottery, Microsoft, AT&T, T-Mobile, power companies, banks and other organizations. Greg’s capabilities include but are not limited to, risk management, penetration testing and red-teaming, vulnerability management, security architecture, threat intelligence proofing and deploying security technologies among others
 Greg has written multiple patents in the fields of threat intelligence, big data security and identity management.
 Greg has been a speaker at multiple venues to include the Cloud Security Alliance, RFUN (Recorded Future Conference), ISACA, AGORA and others.

Ken Dunham, Senior Director, Technical Cyber Threat intelligence, Optiv

Ken Dunham brings more than 28 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions.  He also runs his own advanced intelligence response company, 4D5A Security LLC, and a non-profit for incident responders around the world called Rampart Research.  Mr. Dunham has a long history of innovation for nascent technologies and solutions such as creation of training programs for U2, Warthog, and Predator systems for the USAF, responsible disclosure (iDEFENSE), and cyber threat intelligence (iSIGHT Partners).  He is a widely published author with thousands of security articles and multiple books on topics ranging from Darknet disclosures to mobile threats and mitigation of malware.


Community Search
Sign In


ISSA International Series: Legislative Aspects

ISSA Thought Leadership Series: Update on the latest cyber threats and trends

ISSA OC 34th Annual Symposium

InfoSec Nashville

ISSA International Series: New Trends in Security- Outsourcing and Other Tech

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information