ECSO is proud to host a new exclusive webinar on Cyber Threat Intelligence on 13 March 2025, from 10:30 to 11:45 CET. In this session we will explore two critical facets of Predictive Threat Intelligence (PTI): its role in anticipating and preventing cyberattacks before they occur and how it enhances the efficiency of incident response strategies.
By harnessing advanced analytics and machine learning, organisations can proactively identify vulnerabilities and detect emerging threats. This shift from a reactive to a proactive security posture empowers organisations to not just respond to incidents but to prevent them altogether, ensuring a more resilient defense against evolving cyber risks.
Speakers:
- Gabi Reish (Bitsight, VP Product Management, Cybersixgill)
- Selene Giupponi (Resecurity, Managing Director Europe)
Key topics:
Proactive Defense: Implementing Predictive Threat Intelligence in Modern Enterprises
Gabi Reish, VP Product Management, Cybersixgill – A Bitsight Company
Traditional reactive cybersecurity measures are no longer sufficient in the face of rapidly evolving threats. The session will focus on the adoption of Predictive Threat Intelligence (PTI), which employs advanced analytics, machine learning, and AI to anticipate potential cyberattacks before they occur. It will explore methodologies for integrating PTI into existing security frameworks, enabling organisations to identify and mitigate vulnerabilities proactively. CISOs will learn about the benefits of transitioning to a proactive defense posture, including early threat detection and improved incident response times.
Cyber Threat Intelligence & Digital Investigations – Undercover Operation into Dark Web and Deep Web
Selene Giupponi, Managing Director Europe at Resecurity
As cybercrime continues to thrive on the Deep Web and Dark Web, law enforcement, cybersecurity experts, and investigators face significant challenges. This webinar will dive into the crucial role of Cyber Threat Intelligence (CTI) in identifying, tracking, and mitigating these threats. We will explore the methodologies and techniques used in undercover operations to investigate illegal activities, including drug trafficking, human trafficking, and cyber-attacks. The session will cover the ethical and technical challenges faced during covert operations, from data collection to protecting investigator identities. Attendees will gain insight into the evolving Dark Web landscape, the use of specialised tools and encryption, and the collaborative efforts between international law enforcement agencies. Join us to understand how innovative investigative strategies and CTI are vital in safeguarding security and accountability in a digital world.
Context:
To support organisations in enhancing their cybersecurity defences, ECSO invites its Members to share case studies on the successful application of CTI. These real-world examples will showcase how organisations have used CTI to anticipate and thwart threats before they cause harm.
This session will foster meaningful discussions among cybersecurity practitioners, CTI experts, solution providers, and public authorities. By exchanging knowledge and experiences, ECSO aims to promote the operationalisation of CTI and strengthen collaboration across sectors. The focus will be on practical strategies for improving threat detection, response times, and overall resilience.
Eligibility
This webinar is exclusive for ECSO Members, ECSO CISO Community Members, and public authorities’ representatives. Participants will be accepted upon registration.
About the ECSO CISO Community
The ECSO CISO Community hosts Chief Information Security Officers (CISOs) and other cybersecurity experts working closely with CISOs*, from all across Europe and sectors. Its objective is to promote the exchange of information, good practices, threat intelligence, and to develop common positions of cybersecurity practitioners. To achieve this, the ECSO CISO Community provides regular discussions on topics of general interest to CISOs with a variety of backgrounds and experience levels.
*Excluding cybersecurity managers responsible for sales of services or solutions.