<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center;">Gathering and implementing threat intelligence is overwhelming, but it <em>can</em> be done in an extremely effective and uncomplicated way. John Bambenek, ThreatSTOP's VP of Security and Research, will talk about the threat landscape's new reality, where attackers are financially motivated pros, visibility into threats&nbsp;is limited and the attack surface has grown exponentially. (There have been 96M malware variants since 2016) With this, utilizing threat intelligence the <em>right </em>way (combined with modern packet capture) is <em>essential</em> to IT security and compliance.</p> <!--more--> <p style="text-align: center;">Live Q&amp;A session immediately following the presentation.&nbsp;</p> <p style="text-align: center;"><strong>Reduce Your Attack Surface with Advanced Threat Intelligence</strong></p> <p style="text-align: center;"><strong>Thursday, January 24th.&nbsp;</strong></p> <p style="text-align: center;"><strong>8 - 9 AM PST</strong></p> <p style="text-align: center;">&nbsp;</p> <p>&nbsp;</p> <p style="text-align: center;"><strong><span class="details">About the Speaker:</span></strong></p> <p><span class="details"><span><img src="https://info.threatstop.com/hubfs/johnspeaking.jpg" alt="johnspeaking" width="197" style="width: 197px; float: left; margin: 0px 10px 10px 0px;">John Bambenek is the Vice President of Security, Research and Intelligence at ThreatSTOP, Lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign and a handler with the SANS Internet Storm Center. He has over 18 years experience in information security and leads several international investigative efforts tracking cyber criminals, some of which have led to high profile arrests and legal action.</span></span></p> <p><span class="details"><span>He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.</span></span></p></span>