On Jan 29-30, attendees joined us in Washington, DC or tuned in Live Online for the SANS CTI Summit!
We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through a visual lens, take a look at the recordings below.
*If you registered for the Summit, video recordings are available on your Summit Access page in your SANS Portal.
Keynote | Cybersecurity is GeoPolitical: Lessons From the Fight Against Mercenary Spyware Proliferation
Bill Marczak, Senior Researcher, Citizen Lab
Applying Threat Intelligence Practically to Meet the Needs of an Evolving Regulatory Environment
Sierra Stanczyk, Manager, PwC Threat Intelligence
Rachel Mullan, Director, PwC UK's Cyber Security Practice, PwC

Beyond the Basics: The Role of LLM in Modern Threat Intelligence
Thomas Roccia, Senior Security Researcher, MicrosoftRoberto Rodriguez, Principal Security Researcher, Microsoft

Clustering Attacker Behavior: Connecting the dots in the RaaS Ecosystem
Morgan Demboski, Threat Intelligence Analyst, SophosOSINTer - Automating the CTI heavylifting the open source way!
Bertram Madsen, Founder and Fullstack Developer, OSINTer
Beyond Cryptojacking: Studying Contemporary Malware in the Cloud
Matt Muir,Threat Intelligence Researcher, Cado Security
External Partnerships: How an Information Sharing Analysis Center Works With its Members to Improve Cyber Defenses for their Sector
Sydney Jones, Head of Cyber Threat Intelligence, BNP ParibasElizabeth McAlpine Geary,Senior Analyst, Business Resilience, Financial Services ISAC

How to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise Approach
Yotam Meitar, Director of Cloud Response, Gem Security
Threat Intelligence is a Fallacy, But I May Be Biased
Andy Piazza, Global Head of Threat Intelligence, IBM X-Force
Slow cooking & Cyber Threat Intelligence: Cooking a High Performing Team
Gert-Jan Bruggink, Founder, Managing Director & Cyber Threat Cartographer, Venation
Let's Be Honest about MITRE ATT&CK® Mappings and the "So What?"
Jamie Williams, Principal Adversary Emulation Engineer, The MITRE Corporation
Revisiting the Indicator: Towards a Threat Intelligence Ontology
Joe Slowik
Navigating the Digital Battlefield: A Framework for Geopolitical Cyber Risk Assessmen
Lincoln Kaffenberger, Global Cyber Threat Intelligence Lead, Deloitte Global
Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks
Martin Zugec, Technical Solutions Director, Bitdefender
The D.R. Incident: How Threat Intelligence Helped us Defend and Respond to a Nation-State-Sponsored Threat Actor
Omar Avilez , SOC Manager , CBRT
Intellimation: Guidance for Integrating Automation in Your Cyber Threat Intelligence Program
Brett Tolbert, Senior Threat Intelligence Analyst, NBCUniversal
Sharing, Compared: A Study on the Changing Landscape of CTI Networking
Grace Chi, Co-Founder & COO, Pulsedive
If you'd like to check out our other upcoming Summits, you can view the latest listing here.