On-Demand Webcast|1 hour

Supercharging your threat intelligence with the tools you already have

Sponsored by:

Watch Now

By clicking the Register button below, you agree to SC Media Terms of Use and Privacy Policy.

In the ever-evolving landscape of cyber threats, organizations are sitting on a goldmine of untapped potential within their existing security infrastructure. Our expert panel will guide you through innovative strategies to leverage your current tools for enhanced threat intelligence capabilities. Discover practical insights on optimizing SIEMs, leveraging endpoint protection data, and harnessing the power of network monitoring for a comprehensive threat intelligence approach.

Event Speakers

Mandy Logan
Brainstem Hacker and InfoSec Enthusiast

Advanced, multi-faceted professional with background in SWPP, construction management, functional architect/engineer to field liaison ship, commercial design, and marketing/business development. Re-entering world following fantastic recovery from intense injuries. Using experience and drive to focus on data science, tech development for non-verbal autistics, biohacking and building up the information security community. I’m a fighter, a comic, and a re-abled person through and through, with desire for positive change everywhere I go.

Vikas Shetty
Vice President of product management

Vikas Shetty is vice president of product management at Arkose Labs, a bot management and account security company. Within his responsibilities, he leads the company’s global threat research unit, ACTIR, which is composed of threat hunters, data scientists and treat intel analysts.

Jonathan Trimble
CISO
Corey Kaemming
Sr. Director InfoSec

Corey Kaemming is a highly accomplished and strategic leader with extensive experience and demonstrated success in managing a broad range of risk oversight activities, including risk identification, control design and evaluation, and completion of risk and control self-assessments. In his current role, he successfully navigated a complex 18-month divestiture while implementing key governance frameworks to strengthen privacy and risk management.

Organizations and Education
Master of Science in Management, Computer & Information Systems Security – Colorado Technical University, Colorado
Bachelor of Science, Computer Science & Engineering Technology – The University of Toledo, Ohio
Certificate: Enterprise Cybersecurity Leadership Academy, 20
Co-Chair: CyberSecurity Collaborative – Detroit Chapter