Threat Intelligence

TECHNOLOGIST FORUM

Top vendor technologists share their point of view

It's often overlooked that at the core of each vendor sits at least one brilliant technologist.

They spend their days contemplating solutions to big problems but with all of the punditry crowding industry discourse we rarely get their perspective.

This forum aims to right that.

Panels are comprised of invited vendor technologists and are hosted by non vendor SMEs.

Cybersymposiums Hosts

Richard Stiennon

Richard Stiennon

Anton Chuvakin

Anton Chuvakin

Jim Reavis

Jim Reavis

John Kindervag

John Kindervag

Chase Cunningham

Chase Cunningham

DATE
HOST
TOPIC
PANELISTS
March
Richard Stiennon
Chief Research Analyst
IT-Harvest

Benchmarking Threat Intelligence Collection Platforms

Panelists:TBA
March
Richard Stiennon
Chief Research Analyst
IT-Harvest

Comparing AI‑Enhanced Threat Feed Enrichment & Contextualization

Panelists:TBA
March
Richard Stiennon
Chief Research Analyst
IT-Harvest

Evaluating Predictive Threat Intelligence & Attack Forecasting

Panelists:TBA
March
Richard Stiennon
Chief Research Analyst
IT-Harvest

Assessing Contextualized TI for Asset‑Prioritized Detection

Panelists:TBA
March
Richard Stiennon
Chief Research Analyst
IT-Harvest

Measuring Threat Attribution & Campaign Correlation Capabilities

Panelists:TBA
April
Richard Stiennon
Chief Research Analyst
IT-Harvest

Testing Real‑Time TI for Rapid Response

Panelists:TBA
April
Richard Stiennon
Chief Research Analyst
IT-Harvest

Comparing Threat Intelligence Platforms for Cloud & Container Environments

Panelists:TBA
April
Richard Stiennon
Chief Research Analyst
IT-Harvest

Evaluating OT/ICS Threat Intelligence Solutions

Panelists:TBA
April
Richard Stiennon
Chief Research Analyst
IT-Harvest

Benchmarking TI Quality & Signal Reliability

Panelists:TBA
May
Richard Stiennon
Chief Research Analyst
IT-Harvest

Assessing TI‑driven Detection Engineering & Rule Generation

Panelists:TBA
May
Richard Stiennon
Chief Research Analyst
IT-Harvest

Profiling Threat Intelligence for Supply‑Chain Risk & Third‑Party Exposure

Panelists:TBA
May
Richard Stiennon
Chief Research Analyst
IT-Harvest

Comparing TI Platforms for Phishing & Social‑Engineering Defense

Panelists:TBA
May
Richard Stiennon
Chief Research Analyst
IT-Harvest

Evaluating Multimodal TI for Deepfake & Media Manipulation Threats

Panelists:TBA
June
Richard Stiennon
Chief Research Analyst
IT-Harvest

Measuring TI Integration with SOAR & CTEM Workflows

Panelists:TBA
June
Richard Stiennon
Chief Research Analyst
IT-Harvest

Assessing Threat Intelligence for Red Teaming & PTaaS

Panelists:TBA
June
Richard Stiennon
Chief Research Analyst
IT-Harvest

Comparing Automated TI Triage & Analyst Prioritization Engines

Panelists:TBA
June
Richard Stiennon
Chief Research Analyst
IT-Harvest

Evaluating TI for Identity‑Centric Threat Detection

Panelists:TBA
July
Richard Stiennon
Chief Research Analyst
IT-Harvest

Benchmarking Threat Feed Normalization & Standardization

Panelists:TBA
July
Richard Stiennon
Chief Research Analyst
IT-Harvest

Testing Predictive Vulnerability‑to‑Threat Mapping

Panelists:TBA
July
Richard Stiennon
Chief Research Analyst
IT-Harvest

Assessing Brand Protection Capabilities within Threat Intelligence Platforms

Panelists:TBA
July
Richard Stiennon
Chief Research Analyst
IT-Harvest

Reviewing Community & Shared TI Platforms: Collaboration vs. Commercial TI

Panelists:TBA

Interested in showcasing your technology?

Join our technology agenda and connect with cybersecurity professionals

Get in Touch