On-Demand Webcast|1 hour

Supercharging your threat intelligence with the tools you already have

Sponsored by:

Watch Now

By clicking the Register button below, you agree to SC Media Terms of Use and Privacy Policy.

In the ever-evolving landscape of cyber threats, organizations are sitting on a goldmine of untapped potential within their existing security infrastructure. Our expert panel will guide you through innovative strategies to leverage your current tools for enhanced threat intelligence capabilities. Discover practical insights on optimizing SIEMs, leveraging endpoint protection data, and harnessing the power of network monitoring for a comprehensive threat intelligence approach.

Event Speakers

Mandy Logan
Brainstem Hacker and InfoSec Enthusiast

Advanced, multi-faceted professional with background in SWPP, construction management, functional architect/engineer to field liaison ship, commercial design, and marketing/business development. Re-entering world following fantastic recovery from intense injuries. Using experience and drive to focus on data science, tech development for non-verbal autistics, biohacking and building up the information security community. I’m a fighter, a comic, and a re-abled person through and through, with desire for positive change everywhere I go.

Vikas Shetty
Vice President of product management

Vikas Shetty is vice president of product management at Arkose Labs, a bot management and account security company. Within his responsibilities, he leads the company’s global threat research unit, ACTIR, which is composed of threat hunters, data scientists and treat intel analysts.

Jonathan Trimble
CISO
Corey Kaemming
CISO

Corey is a highly accomplished and strategic leader with extensive experience and demonstrated success in managing a broad range of risk oversight activities, including risk identification, control design and evaluation, and completion of risk and control self-assessments. He possesses specialist expertise in network security architecture, network access and monitoring, data governance and monitoring, identity and access management, and employee education and awareness. Corey is highly experienced in developing and building comprehensive information security programs to proactively ensure the confidentiality, integrity, availability, safety, and privacy of the organization’s intellectual property and information technology assets. Currently leading the charge in strengthening Valvoline’s security posture. In this role, he provides executive leadership across key areas, including Security Operations, Engineering and Architecture, Identity Management, GRC, and Enterprise Security Architecture. Managing a large budget, he drives resource management, tool implementations, and strategic investments that support long-term security objectives.