<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">
Threat-Informed Defense: Transforming the Security Organization As We Know It


Think About Your Audience Before Choosing a Webinar Title

Sponsored by AttackIQ

Wednesday, June 17, 2020
3 pm EDT

MITRE ATT&CK has created a new, more strategic focus of capability for the security organization as a whole. By mapping and testing against known hacker tactics, techniques and procedures (TTPs), security teams can create a threat-informed defense strategy, which is embodied in the concept of a purple team. Security teams are transforming as a result of this, and their mission is improving.

Learn from our experts who will share the experiences from their journeys at companies that have made this organizational transformation. 

Chris Kennedy
CISO - AttackIQ
Chris Kennedy is an impassioned security executive that has a proven track record in building and delivering enterprise security programs for some of the most important critical infrastructure organizations in the world.  As a military officer, Chris led the initial development of the US Marine Corps’ global incident response organization, held various roles in defense contracting including delivering the US Department of Treasury’s Cybersecurity Operations program, driving cybersecurity, and products and services. He most recently helped Bridgewater Associates, the largest hedge fund in the world, secure their enterprise.
Pete Luban
Head of Cybersecurity and IT Risk - Dimensional Fund Advisors
Pete has been in various risk and security management roles over the past 21 years at several well known financial and internet companies such as google, Netflix, Yahoo and Citi. Pete is currently engaged in introducing a new evolution of cybersecurity capabilities at Dimensional Fund Advisors, a global asset manager with 600 billion AUM.
John Fung
Associate Director of Cyber Content and Threat Hunting - Raytheon
John Fung is a security leader who excels at solving complex problems, and building high-performing teams. He lives and breathes security, and enjoys this field as both a career and a hobby. He has built two SOCs, an operations center, and the Cyber Threat Hunting and Content program at UTC. He is also an active contributor to the security field. He has presented as a subject matter expert on topics from leveraging analytics to detecting fraud through systematically reducing risk using adversary intel and the MITRE ATT&CK framework. 


On-Demand Viewing

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.