Thursday, OCTOBER 24th, 2024

Thinking Like an Attacker: Turning Threat Intelligence into Proactive Defense

5:30pm - 8pm CT | Houston, TX

Event Overview

As cyber threats grow more complex, organizations must leverage both threat intelligence and offensive security techniques to stay ahead. High-profile vulnerabilities like the MoveIt attack demonstrate the need for continuous visibility into your digital footprint and a
proactive approach to defense. But how do you operationalize threat intelligence effectively, turning raw data into actionable insights that reflect the hacker’s perspective?

This exclusive roundtable, jointly hosted by EclecticIQ and Hadrian, will delve into how organizations can fuse threat intelligence with offensive security to enhance their cybersecurity posture. Learn how to map your external attack surface, simulate real-world attacks, and prioritize critical risks using automation and AI. Together, these insights can help reduce incident response times and support a strategic, business-aligned defense.

KEY TAKEAWAYS

  • Operationalizing Threat Intelligence: How to convert overwhelming volumes of data into prioritized, actionable insights that reflect real-world attack scenarios.

  • Learning from MoveIt: The lessons high profile attacks teach about identifying
    vulnerabilities and defending against them.

  • Adopting the Hacker’s Mindset: How to think like a hacker to understand your attack surface, anticipate threats, and prioritize risks.

  • Scaling with Automation: The role of AI and automation in enhancing threat detection, filtering through the noise, and enabling efficient threat intelligence
    operations.

  • Simulating Real Attacks: Using threat simulations to improve response capabilities
    and make informed, strategic decisions.

  • Fostering Cross-Team Collaboration: How integrating intelligence across security, IT,
    Risk, and Leadership teams can break down silos and lead to better outcomes.

  • Aligning Security with Business Goals: Ensuring your threat intelligence and security
    strategies support broader organizational objectives.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Pat Benoit

Former Global CISO 

Brinks

 

Maurice Clin

Co-founder

Hadrian

James Collins

Head of Global Enterprise

EclecticIQ

Speakers

This roundtable, led by Maurice Clin, Co-founder at Hadrian and James Collins, Head of Global Enterprise at EclecticIQ, will explore how organizations can operationalize threat intelligence, continuously map digital footprints, and simulate real-world attack scenarios.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Maurice Clin

Co-founder

Hadrian

Clin’s expertise lies in business growth strategies, fostering innovation and building partnerships to
enhance cybersecurity in the digital age. He helps clients identify and monitor digital assets, ensuring
that no critical risks remain in their infrastructure.

Subject matter expert

James Collins

Head of Global Enterprise

EclecticIQ

Collins oversees global enterprise clients, helping them embed intelligence at the core of their defenses.
With extensive experience in delivering cyberthreat intelligence programs, he assists Global 2000
companies in operationalizing threat intelligence and improving detection and response capabilities.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

The Palm - Downtown Houston

1201 Fannin St Suite 129, Houston, TX 77002

Underwritten by

Hadrian uses AI-powered offensive security to identify and validate risks that could be exploited in a real-world data breach. The platform combines attack surface discovery, automated penetration testing, and threat exposure management in a cloud-based, agentless solution. Continuously updated by an in-house hacker team, Hadrian helps organizations rapidly mature their security programs, remediating critical exposures with less effort and cost. Founded in 2021, Hadrian has become a leader in Attack Surface Management, recognized as a market Leader and Outperformer by GigaOm in 2024. Operating globally, Hadrian supports security teams across Europe, the UK, and beyond.

EclecticIQ is a global leader in Cyber Threat Intelligence technology and services. Large enterprises and governments use our platform to automate intelligence management and enhance collaboration across security teams. Our open, extensible platform helps customers stay ahead of evolving threats by embedding intelligence at the core of their cyber defenses. We empower organizations to detect sophisticated threats, improve security team efficiency, and bolster cyber resilience. Supported by a network of top-tier technology partners, EclecticIQ is committed to flexibility, open standards, and innovation through its active role in the open-source community. Founded in 2014, we operate across Europe, the UK, and North America.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025