StreamYard On-Air

#4 - Architecting OpenCTI for Classified Airgapped Environments

Join Filigran for a 45-minute session (30 minutes presentation + 15 minutes Q&A) designed to empower government agencies and defense organizations in deploying advanced threat intelligence platforms in sensitive, air-gapped environments. ๐–๐ก๐š๐ญ ๐˜๐จ๐ฎโ€™๐ฅ๐ฅ ๐‹๐ž๐š๐ซ๐ง - ๐Œ๐ฎ๐ฅ๐ญ๐ข-๐‹๐ž๐ฏ๐ž๐ฅ ๐€๐ซ๐œ๐ก๐ข๐ญ๐ž๐œ๐ญ๐ฎ๐ซ๐ž๐ฌ: How to architect OpenCTI for multiple classification levels. - ๐€๐ข๐ซ๐ ๐š๐ฉ ๐“๐จ๐จ๐ฅ๐ฌ: An overview of essential tools for operating in airgapped environments, including data diodes and batch data synchronization. - ๐Ž๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐๐ž๐ฌ๐ญ ๐๐ซ๐š๐œ๐ญ๐ข๐œ๐ž๐ฌ: Guidance on best practices around data ingest, egress, and classification markings. ๐๐š๐œ๐ค๐ ๐ซ๐จ๐ฎ๐ง๐ With the growth of centralized national cybersecurity agencies, the expansion of national CERTs and CSCs, and the integration of threat intelligence platforms into theater command operations in modern armed forces, the need for secure, air-gapped deployments has never been more critical. This session will address the unique challenges and solutions for deploying OpenCTI and OpenBAS in environments where operational security and data sensitivity are paramount. ๐–๐ก๐จ ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐€๐ญ๐ญ๐ž๐ง๐ - Intelligence Community and National Security Professionals - Government Cybersecurity Teams Operating at Higher Classifications - Federal Agencies - Defense Contractors and the Military ๐Œ๐ž๐ž๐ญ ๐ญ๐ก๐ž ๐’๐ฉ๐ž๐š๐ค๐ž๐ซ With 8+ years in cyber threat intelligence, ๐‰๐ž๐ซ๐ฆ๐š๐ข๐ง ๐๐ฃ๐ž๐ฆ๐š๐ง๐ณ๐ž, ๐„๐Œ๐„๐€ ๐‹๐ž๐š๐ ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ ๐š๐ญ ๐…๐ข๐ฅ๐ข๐ ๐ซ๐š๐ง specializes in OpenCTI and helps organizations deploy advanced cyber threat intelligence solutions. He has deep insights into leveraging automation to modernize security operations and enhance threat intelligence. ๐‘๐ž๐ฌ๐ž๐ซ๐ฏ๐ž ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ฉ๐จ๐ญ ๐ญ๐จ๐๐š๐ฒ! Donโ€™t miss this opportunity to gain actionable strategies for architecting and deploying threat intelligence platforms in airgapped environments. Secure your place in this essential session and join the conversation on safeguarding national security. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ธ๐˜ฆ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ ๐˜ช๐˜ด ๐˜ฑ๐˜ข๐˜ณ๐˜ต ๐˜ฐ๐˜ง ๐˜ฐ๐˜ถ๐˜ณ ๐˜ฆ๐˜น๐˜ค๐˜ญ๐˜ถ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜Ž๐˜ฐ๐˜ท ๐˜ž๐˜ฆ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ ๐˜š๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ดโ€”๐˜ข ๐˜ค๐˜ฐ๐˜ญ๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜ฆ๐˜ท๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ต๐˜ข๐˜ช๐˜ญ๐˜ฐ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ฐ๐˜ณ ๐˜จ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด. ๐˜“๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜ฎ๐˜ฐ๐˜ณ๐˜ฆ ๐˜ข๐˜ฃ๐˜ฐ๐˜ถ๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ฉ๐˜ฆ๐˜ณ๐˜ฆ: ๐˜ง๐˜ช๐˜ญ๐˜ช๐˜จ๐˜ณ๐˜ข๐˜ฏ.๐˜ช๐˜ฐ/๐˜จ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต-๐˜ธ๐˜ฆ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ-๐˜ด๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ด.

Already registered?