This video chat is brought to you by IBM Analytics using Blab, a new video chat interface in beta allowing users the opportunity to ask questions and watch live as experts discuss real-time fraud detection.
With sophisticated cyber attacks on the rise, realizing that the threat intelligence market is predicted to be worth $5,860 million by 2020 is far from surprising. From new trends creeping up on the dark web and potential shifts in target industries and organizations, to new technologies and personnel that organizations can acquire to neutralize these threats and avoid headlines, you don’t want to miss this conversation.
Bob Stasio is a senior product manager of cyber analysis with IBM i2 Safer Planet. He brings nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the National Security Agency (NSA) and the commercial sector. Stasio also served on the initial staff of US Cyber Command. During the troop surge of 2007, his intelligence unit supported the detainment of more than 450 high-value targets.
Richard Stiennon is a veteran of the security industry and, as an industry analyst, has years of experience advising enterprises, vendors and government agencies on their security strategies. He continues to help large enterprises better protect their networks and to help vendors serve those needs. Stiennon is the author of Surviving Cyberwar (Government Institutes, 2010) and UP and to the RIGHT: Strategy and Tactics of Analyst Influence (IT-Harvest Press, 2012).
Shahid Shah is the CEO of Netspective Communications. He is an award-winning Government 2.0, Health IT, Bio IT and digital medical device inventor and CTO with more than 25 years of technology strategy, architecture, engineering, entrepreneurship, speaking and writing experience. Shah is also the chair of the #HealthIMPACT Forum.
Topics of discussion
We have seen some serious breaches of financial institutions and healthcare in 2015. Which industries or specific organizations will be impacted in 2016?
Will 2016 be the year in which we see a true breach and impact to critical infrastructure—for example, power, water and so on?
ISIS appears to have a deep following on the Internet and social media. Do you think 2016 will see it venture into offensive cyber areas?
What kinds of breakout technologies and/or companies in security should we be looking for in 2016?
What additional personnel positions—for example, chief risk officer (CRO), director of threat intelligence, and so on—will be added to companies in 2016?
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
- Blog2022.10.12Vulnerability management with Wazuh open source XDR
- Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
View all comments