intel471.com
Open in
urlscan Pro
2606:4700:20::681a:f9e
Public Scan
URL:
https://intel471.com/471-unconference-seattle-2024
Submission: On November 06 via manual from PH — Scanned from DE
Submission: On November 06 via manual from PH — Scanned from DE
Form analysis
1 forms found in the DOMhttps://intel471.com/search
<form class="h-[60px] w-full relative " action="https://intel471.com/search" data-hs-cf-bound="true">
<span class="absolute left-4 top-1/2 transform -translate-y-1/2">
<span class="header-search-icon">
<svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
<path
d="M19.55 20.575L13.25 14.3C12.75 14.7167 12.175 15.0417 11.525 15.275C10.875 15.5083 10.2083 15.625 9.52499 15.625C7.80833 15.625 6.35833 15.0333 5.17499 13.85C3.99166 12.6667 3.39999 11.2167 3.39999 9.5C3.39999 7.8 3.99166 6.354 5.17499 5.162C6.35833 3.97067 7.80833 3.375 9.52499 3.375C11.225 3.375 12.6667 3.96667 13.85 5.15C15.0333 6.33333 15.625 7.78333 15.625 9.5C15.625 10.2167 15.5083 10.9 15.275 11.55C15.0417 12.2 14.725 12.7667 14.325 13.25L20.6 19.525L19.55 20.575ZM9.52499 14.125C10.8083 14.125 11.896 13.675 12.788 12.775C13.6793 11.875 14.125 10.7833 14.125 9.5C14.125 8.21667 13.6793 7.125 12.788 6.225C11.896 5.325 10.8083 4.875 9.52499 4.875C8.22499 4.875 7.12933 5.325 6.23799 6.225C5.34599 7.125 4.89999 8.21667 4.89999 9.5C4.89999 10.7833 5.34599 11.875 6.23799 12.775C7.12933 13.675 8.22499 14.125 9.52499 14.125Z"
fill="#130F10"></path>
</svg>
</span>
</span>
<input type="text" id="search-nav-input" class="w-full text-lg text-neutral-900 h-full px-12 placeholder:opacity-50 focus:outline-none focus:ring-none border-transparent border-b focus:border-b-primary-red-500" name="query" value="" sprig=""
x-data="gaGlobalSearch()" @input.debounce.1500ms="sendSearchTerms()" s-trigger="keyup changed delay:300ms" s-replace="#results" s-indicator="#search-bar-loading-indicator" placeholder="Search Intel 471" autocomplete="off"
data-hx-get="https://intel471.com/index.php/actions/sprig-core/components/render" data-hx-trigger="keyup changed delay:300ms" data-hx-select="#results" data-hx-target="#results" data-hx-swap="outerHTML"
data-hx-indicator="#search-bar-loading-indicator" data-sprig-parsed="">
<button type="button" x-on:click="searchOpen = false;" class="absolute right-4 top-1/2 transform -translate-y-1/2">
<svg width="14" height="14" viewBox="0 0 14 14" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.07692 14L0 12.9231L5.92308 7L0 1.07692L1.07692 0L7 5.92308L12.9231 0L14 1.07692L8.07692 7L14 12.9231L12.9231 14L7 8.07692L1.07692 14Z" fill="#130F10"></path>
</svg>
</button>
</form>
Text Content
Press Alt+1 for screen-reader mode, Alt+0 to cancelAccessibility Screen-Reader Guide, Feedback, and Issue Reporting Skip to content Return to Intel471 homepage. * Platform TITAN CYBERCRIME INTELLIGENCE PLATFORM Platform * Capabilities * Adversary Intelligence * Credential Intelligence * Malware Intelligence * Vulnerability Intelligence * Marketplace Intelligence * Cyber Geopolitical Intelligence * Threat Hunt Intelligence Gaining the Advantage with Covert Cyber HUMINT Delve deep into the world of Cyber Human Intelligence (HUMINT) — where traditional human intelligence meets the digital world. Discover the strengths, challenges, and best practices to arm your organization with advanced, holistic defense strategies. * Solutions * Third-Party Risk * 3rd Party Breach Monitoring * 3rd Party Compromised Credential Monitoring * 3rd Party Vulnerability Monitoring * Supply Chain Risk Monitoring * System Integrity * Vulnerability Management * Attack Surface Protection * Attack Surface Intelligence * Fraud Protection * Fraud * Brand Protection * PII Abuse * Identity & Access * Compromised Credential Management * Account Takeover Protection * Risk & Compliance * Cyber Geopolitical Intelligence * Insider Threat Mitigation * Data or System Breach * Vulnerability Management * Security Operations * Incident Response * Malicious Traffic Detection * Threat Hunting "A major factor that distinguishes Intel 471 from competitors is its emphasis on specific target profiles... No other product was found to offer this valuable capability." - U.S. Government Agency * Resources * Resource Center * Intel 471 Blog * White Papers * Data Sheets * HUNTER Community Platform * 471 Live * Podcasts * Videos * Webinars On-Demand * Tools & Support * Cyber Underground Handbook * Glossary * Attack Surface Documentation Trending Article Deepfake vs Democracy The Impact of Disinformation Campaigns on 2024 Election AI tools could pose significant risk of amplifying political disinformation on a never-before-seen scale. This report provides insights into the current threat landscape, allowing for better preparation and protection against these emerging risks. * Company * Intel 471 * About Us * Leadership * Careers * News & Press * Contact Us * Events * Trade Shows & Conferences * Webinars On-Demand * Partners * Technology Partners * Channel Partners * Industry Partners "More sources, a better understanding of the threat landscape, and better professionals working undercover in the darkest corners of the cybercrime world." - E.U. Electronics Manufacturer Let's Talk Open Menu 471 UNCONFERENCE SEATTLE Tuesday, November 12, 2024 | 11:00 AM - 3:15 PM PST * Save Your Spot INVITATION ONLY CTI & THREAT HUNTING UNCONFERENCE Tuesday, November 12, 2024 | 11:00 AM - 3:15 PM PST LUNCH INCLUDED Location: T-Mobile Headquarters Bellevue, Washington You’re invited to join Intel 471 along with Seattle’s top cybersecurity industry experts and esteemed peers at this exclusive vendor-neutral UnConference. This event will take you through an extensive understanding of how professionals are leveraging CTI and Threat Hunting to optimize operational processes. Discover how experts combine exclusive CTI insights and pair them with unparalleled behavioral threat hunt capabilities to defend against the industry’s top threats. Our keynote speaker, Clay Hamilton-Alexander from Autodesk, will dive into how his team built out their CTI program and integrated Threat Hunting, while sharing their successes and setbacks. Intel 471 wants to share how its unique insights into the underground and intelligence-led threat hunting can mitigate cyber risk, as enabled with its acquisition of Cyborg Security. Malicious actors are constantly adapting to the progressing threat landscape to find new and improved ways to launch attacks. In return, organizations must stay up-to-date with real-time threat insights to mitigate these risks. This UnConference will provide you with strategic measures to better enhance your CTI and threat hunting knowledge, implementation, and solutions. We look forward to seeing you! THE AGENDA 11:00 AM: Arrival & Registration - Light Refreshments 11:30 AM - 11:45 AM: Welcome by Brandon Hoffman | Chief Strategy Officer 11:45 AM - 12:30 PM: Threat Hunting - Operationalizing Intelligence by Clay Hamilton-Alexander | Sr. Manager, Cyber Threat Management | Autodesk * Follow the journey of a team determined to provision effective threat hunting across the organization * Understand what worked and what did not with key takeaways and lessons learned * See how CTI and Threat Hunting can be paired together to take both preventative and proactive actions against threats 12:30 PM - 1:45 PM: Lunch 1:45 PM - 2:30 PM: Operationalizing Threat Hunting - Reactive vs. Proactive by Nick Summerlin | VP Malware Intelligence and Mike Mitchell | VP Threat Hunt Intelligence 2:30 PM - 3:15 PM: CTI Interactive Roundtable Discussions 3:15 PM: Networking (Optional) | T-Mobile On-Site Bar Join the 471 team for free drinks and light bites before heading home RESERVE YOUR SPOT MEET YOUR HOSTS Brandon Hoffman | Chief Strategy Officer Hoffman is the Chief Strategy Officer at Intel 471, leading a global team in product and R&D. With 20 years of experience in cybersecurity, he served as CISO and Head of Security Strategy at Netenrich, and as VP of Intelligence Solutions at Intel 471, where he was responsible for Fortune 500 and government customers globally. Mike Mitchell | VP, Threat Hunt Intelligence Mike is VP of Threat Hunt Intelligence, and prior to joining Intel 471 he was a co-founder of recently acquired threat hunting provider, Cyborg Security. While at Cyborg, he was a cross-functional founder focused on technical implementation, sales, product architecture, and managing the content development team and its deliverables. Mike has 12 + years of diverse cyber security experience from Senior Solutions and Security Engineer, Director of Sales Engineering to Co-Founder of Cyborg Security. Prior to his career in cyber security, Mike spent a number of years in pro baseball with the Colorado Rockies. Nick Summerlin | VP, Malware Intelligence Over the past 7 years, Nick helped design and build the Malware Intel capability at Intel 471. Prior to that, Nick was building collection systems and researching malware at iSIGHT Partners, FireEye and IID. A University of Washington alumni, Nick lived in Seattle for several years where he studied computer science. SIGN UP FOR OUR EXECUTIVE INTEL UPDATE Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization. Sign Up Today Return to Intel471 homepage. Whether scaling your cybersecurity presence or starting to build your team, we help you fight cyber threats. * Meet with an expert * +1 (800) 833-1471 * * Company * Leadership * Careers * News & Press * Contact Us * Resources * Data Sheets * Webinars On-Demand * White Papers * * Platform * Adversary Intelligence * Credential Intelligence * Malware Intelligence * Vulnerability Intelligence * Marketplace Intelligence * * Solutions * Vulnerability Monitoring * Attack Surface Protection * Incident Response * Compromised Credential Monitoring * Threat Hunting © 2024 Intel471 | Privacy Policy | Terms of Service | End User Agreement | Modern Slavery and Human Trafficking Statement * Find Intel471 on Facebook * Find Intel471 on YouTube * Find Intel471 on Twitter * Find Intel471 on LinkedIn * Find Intel471 on Instagram TRENDING SEARCHES * Trending cyber security * Trending covid-19 * Trending breach * Trending malware POPULAR RESOURCES * Article ERMAC 2.0: PERFECTING THE ART OF ACCOUNT TAKEOVER * Datasheet MALWARE INTELLIGENCE * Article HERE’S HOW TO USE INTEL 471 WITH EXISTING INTELLIGENCE FRAMEWORKS Close modal Featured Resource AresLoader is a new loader malware-as-a-service (MaaS) offered by threat actors with links to Russian hacktivism that was spotted recently in the wild. Read full article * Platform * Titan * Adversary Intelligence * Credential Intelligence * Malware Intelligence * Vulnerability Intelligence * Marketplace Intelligence * Cyber Geopolitical Intelligence * Threat Hunt Intelligence * Solutions * 3rd Party Compromised Credential Monitoring * 3rd Party Breach Monitoring * 3rd Party Vulnerability Management * Attack Surface Protection * Supply Chain Risk Monitoring * Account Takeover Protection * Insider Threat Mitigation * Data or System Breach * Incident Response * Malicious Traffic Detection * Threat Hunting * Compromised Credential Management * Vulnerability Monitoring * Attack Surface Intelligence * Fraud * Brand Protection * PII Abuse * Resources * Intel 471 Blog * Cyber Underground Handbook * Data Sheets * Glossary * Podcasts * Videos * Webinars On-Demand * White Papers * Attack Surface Documentation * HUNTER Community Platform * Company * About Us * Leadership * Careers * News & Press * Contact Us * Trade Shows & Conferences * Industry Partners * Channel Partners * Technology Partners Let's Talk * Find Intel471 on Facebook * Find Intel471 on YouTube * Find Intel471 on Twitter * Find Intel471 on LinkedIn * Find Intel471 on Instagram © 2024 Intel471 | Privacy Policy | Terms of Service | End User Agreement | Modern Slavery and Human Trafficking Statement Close modal