log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
Cyber Intelligence: A Discipline Not a Data Feed
Jim Penrose - Darktrace
Friday, March 13, 2015, 11:00-11:59 am Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Registration requested: The organizer of this talk requests that you register if you are planning to attend. There are two ways to register: (1) You can create an account on this site (click the "register" link in the upper-right corner) and then register for this talk; or (2) You can enter your details below and click the "Register for talk" button. Either way, you can always cancel your registration later.

Name:
Email:
Organization:

Abstract

This talk will make a thought-provoking invitation to academia for a new approach to threat detection based on augmenting the existing security stack to provide intelligence to catch intruders before a crisis occurs. This talk will outline how cyber intelligence professionals can help companies evolve data management to focus on timely response action.

Bio

Jim Penrose is the EVP for Cyber Intelligence at Darktrace where he leads the firm’s cyber operations team. A distinguished speaker, Jim has presented at the 2014 Cybersecurity Summit, the Gartner Security & Risk Management Summit, and the Suits and Spooks London 2014 meeting.

Jim joined Darktrace following a successful 17-year tenure at the NSA. There, he achieved the rank of Defense Intelligence Senior Level and was responsible for a variety of roles encompassing cyber threat analysis and counterterrorism. Most recently, as Chief of the Operational Discovery Center, Jim innovated new signal intelligence capabilities to discover previously unknown threats.

Jim has been at the forefront of cyber operations throughout his career and was nominated for a Presidential Rank award in 2013. His security certifications include Graduate Certificate, Computer Security and Information Assurance, George Washington University.

This talk is organized by Carolyn Flowers