CTA Webinar – Connected Yet Divided: Navigating Cybersecurity in a Fractured World

Global instability has fractured the world’s political, economic, and technological systems — and cyberspace, once a unifying infrastructure, now mirrors and magnifies that fragmentation. In this panel discussion five cybersecurity leaders and geopolitical experts explore how the erosion of global trust is reshaping digital defense. From rising state-sponsored cyber… Read More

Post Type
event

CTA Webinar – Not another AI panel?*!

As the hype cycle continues to churn, how should we think about the cybersecurity challenges and opportunities posed by AI? Reality is lot messier and often more contradictory than the marketing taglines or the media headlines. In this discussion, Jaya Baloo, Steve Grobman, Mike Sikorski, and Michael Daniel will… Read More

Post Type
event

CTA Webinar – What Gets Measured, Gets Done: A National Dashboard for Cybersecurity

That quote from Coleridge’s The Rime of the Ancient Mariner aptly describes the situation with cyber metrics: we are awash in data yet have trouble measuring cybersecurity, particularly at the national level.  In this webinar, Michael Daniel (CTA), Jason Healey (Columbia University), Wade Baker (Cyentia), Chris Wysopal (Veracode), and… Read More

Post Type
Blog
Category
Webinar

CTA Webinar – Flowing through the ATT&CK Matrix

Although indicators of compromise remain important for cyber threat intelligence sharing, cybersecurity providers need to begin sharing information about how malicious actors sequence their activities. MITRE’s ATT&CK Flow capability allows for the sharing of such information in a standardized format, enabling the information to be shared in an automated… Read More

Post Type
Blog
Category
Webinar

CTA Webinar – Flowing through the ATT&CK Matrix

Although indicators of compromise remain important for cyber threat intelligence sharing, cybersecurity providers need to begin sharing information about how malicious actors sequence their activities. MITRE’s ATT&CK Flow capability allows for the sharing of such information in a standardized format, enabling the information to be shared in an automated fashion. Read More

Post Type
event

CTA Webinar – CISA 2015 Reauthorization: What’s all the fuss about?

The Cybersecurity Information Sharing Act of 2015 was the culmination of more than five years of work. Someone reading the statute now might think the activities it authorizes are rather pedestrian. Yet, concerns at the time were significant enough that the statute included a sunset clause for September 30, 2025. Read More

Post Type
Blog
Category
Webinar