OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti-users] 2019 FIRST Symposium on Cyber Threat Intelligence: registration and CFP are open


Shawn â Good question.

 

As one member of the program committee my opinion is that the intention is that it would cover both aspects but it was primarily the later (i.e. integration of CTI into other security operational tools).

 

Regards

 

Allan Thomson

CTO (+1-408-331-6646)

LookingGlass Cyber Solutions

 

From: "cti-users@lists.oasis-open.org" <cti-users@lists.oasis-open.org> on behalf of Shawn Riley <shawn.p.riley@gmail.com>
Date: Wednesday, August 22, 2018 at 5:02 AM
To: "trey@newcontext.com" <trey@newcontext.com>
Cc: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org>, "cti-users@lists.oasis-open.org" <cti-users@lists.oasis-open.org>
Subject: Re: [cti-users] 2019 FIRST Symposium on Cyber Threat Intelligence: registration and CFP are open

 

Quick question of clarification, on the topic of:

  • Overcoming CTI integration challenges in your security operations.

Is "integration" in this context more aimed at the integration of CTI itself or the integration of CTI into other solutions? I see them as different challenges so I wanted to ask.

 

Integration of CTI itself would follow the path of the U.S. DoD/IC towards integrated intelligence which uses the field of knowledge engineering to integrate intelligence information, contextual information, and human expertise/experience into domain specific semantic knowledge graphs. This enable the scaling of human expertise and experience along with the object level integration and semantic interoperability of information and the supporting contextual information. 

 

Integration of CTI into other solutions is also being addressed with things like mechanistic playbooks, normally some kind of scripting to execute a mechanistic action. 

 

Any clarification would be appreciated since both types of integration are actively being worked. 

 

Thanks,

Shawn 

 

On Wed, Aug 22, 2018 at 3:06 AM Trey Darley <trey@newcontext.com> wrote:

Hi, y'all -

Just writing to inform you that registration is now open for the 18-20
March 2019 FIRST Symposium on Cyber Threat Intelligence at BT Centre
(81 Newgate Street, London), hosted by BT and Digital Shadows. This
year's theme is "Putting the Intelligence back into CTI".

There will be one day of training followed by two days of plenary
sessions. This event is open to both FIRST members and non-members.

You can register and find all of the relevant logistical details via
the FIRST event page [1].

If your organization is interested in sponsoring the event, details
are available here [2].

We're still looking for training and talk proposals. These should be
submitted via EasyChair [3]. (All submissions must be received by
23:59 UTC 30 October 2018.)

[1]: https://first.org/events/symposium/london2019/
[2]: https://www.first.org/_/e/FIRST2018-19_Symposia_Sponsorship_Packages-Fillable.pdf
[3]: https://easychair.org/cfp/first_cti_2019

--
Regards,
Trey Darley, Program Chair
++--------------------------------------------------------------------------++
Director of Standards Development, New Context
gpg fingerprint: 3918 9D7E 50F5 088F 823F  018A 831A 270A 6C4F C338
++--------------------------------------------------------------------------++
--
"Anyone who isn't confused doesn't really understand the situation."
--Edward R. Murrow



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]