On Demand Webinar:
Threat-Informed Defense: Transforming the Security Organization As We Know It



MITRE ATT&CK has created a new, more strategic focus of capability for the security organization as a whole. By mapping and testing against known hacker tactics, techniques and procedures (TTPs), security teams can create a threat-informed defense strategy, which is embodied in the concept of a purple team. Security teams are transforming as a result of this, and their mission is improving.

Learn from our experts who will share the experiences from their journeys at companies that have made this organizational transformation.

Chris Kennedy, CISO, AttackIQ
Chris Kennedy is an impassioned security executive that has a proven track record in building and delivering enterprise security programs for some of the most important critical infrastructure organizations in the world. As a military officer, Chris led the initial development of the US Marine Corps’ global incident response organization, held various roles in defense contracting including delivering the US Department of Treasury’s Cybersecurity Operations program, driving cybersecurity, and products and services. He most recently helped Bridgewater Associates, the largest hedge fund in the world, secure their enterprise.

Pete Luban, Head of Cybersecurity and IT Risk, Dimensional Fund Advisors
Pete has been in various risk and security management roles over the past 21 years at several well known financial and internet companies such as google, Netflix, Yahoo and Citi. Pete is currently engaged in introducing a new evolution of cybersecurity capabilities at Dimensional Fund Advisors, a global asset manager with 600 billion AUM.

John Fung, Associate Director of Cyber Content and Threat Hunting, Raytheon
John Fung is a security leader who excels at solving complex problems, and building high-performing teams. He lives and breathes security, and enjoys this field as both a career and a hobby. He has built two SOCs, an operations center, and the Cyber Threat Hunting and Content program at UTC. He is also an active contributor to the security field. He has presented as a subject matter expert on topics from leveraging analytics to detecting fraud through systematically reducing risk using adversary intel and the MITRE ATT&CK framework.

Register to view our on-demand webinar to learn more!


// This responsive embed container can be used for video or maps and can be copy/pasted into any other editable area
// Nested 2-column section

Section 3

Copy. Paste. Win.

Copy and paste this HTML into any other section to create a nested 2-column layout in a differnet spot on the LP.

A primary text link →

// There is a form below this content - it'll shrink up if it's not used