Login to View
StrategyR is a trade mark of Global Industry Analysts, Inc. USA
A trade mark of Global Industry Analysts, Inc.

Threat Intelligence

A Global Strategic Business Report

MCP15221

RESEARCH TRANSCRIPTS
ServiceNow and Threat Intelligence with TruSTAR - Introduction and product demo
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

- We are striving to offer ever better products and services to keep your organization secure and ahead of the game. A recent example is the technology partnership between ServiceNow Security Operations and TruSTAR to help customers automate and operationalize Cyber Threat Intelligence. ServiceNow’s Security Incident Response, and TruSTAR’s Intelligence Management platform can now work together to distribute threat intelligence information between teams, industry peers, and other data systems, all while accelerating automation to remediate threats faster. The feature highlights of this joint solution includes : - Enrich IoCs in ServiceNow SIR via OSINT/Premium Sources and internal intelligence - Automatically submit SIRs as TruSTAR reports and extract IoCs - Automatically enrich IoCs and provide context using ServiceNow's Threat Lookup capability - Ability to custom tag indicators in Threat Lookup for historical context - Share TruSTAR reports and IoCs across ISACs/ISAOs and internal teams via enclaves - Configure app with fine tune controls - Whitelisting observables in TruSTAR directly from ServiceNow SIR This application is available already in the ServiceNow Store: https://store.servicenow.com/sn_appstore_store.do#!/store/application/9e296e96db6bd81062939098f496199c/2.0.0?referer=%2Fstore%2Fsearch%3Flistingtype%3Dallintegrations%25253Bancillary_app%25253Bcertified_apps%25253Bcontent%25253Bindustry_solution%25253Boem%25253Butility%26q%3DTruSTAR&sl=sh Deepak Kolingivadi, Director of Product, SecOps, ServiceNow. Deepak leads product management for the Security Operations function on the ServiceNow Platform. He has over two decades of cybersecurity industry experience, developing product strategy and roadmap for security products as well as conceptualizing and engineering them.​ Patrick Coughlin, CEO, TruSTAR. Patrick is co-founder and CEO of TruSTAR, an enterprise intelligence management platform that transforms intelligence for actionable automation in security operations. Prior to TruSTAR, Patrick led cybersecurity initiatives in the Middle East for Good Harbor International and counterterrorism analyst teams for Booz Allen Hamilton clients in the US Department of Defense and US Special Operations Command. Elvis Hovor, VP of Product, TruSTAR. Elvis is VP of Product at TruSTAR where he is responsible for product management of our core platform and the growing ecosystem of market-leading integration partners. Elvis has 10+ years of experience in information security and prior to TruSTAR he worked as an information security analyst and later led Accenture Technology Labs incubation and delivery of threat intelligence platforms for Fortune 500 customers. Agenda: - Threat Intelligence – Deepak Kolingivadi 10 min​ - Introduction of TruSTAR – Patrick Coughlin 10 min​ - Demo – Elvis Hovor 25 min​ - Q&A - 10 min​ - Next steps - 5 min Please take the survey: https://forms.office.com/Pages/ResponsePage.aspx?id=cPHPi3mZHkmGg9jO0IULrWFpWABZyXNPgd4PAO_pKXpUNExKQjdHTzBKMlhVS1lZUE1WMFZWWVlSWi4u For all questions and discussion: https://community.servicenow.com/community?id=community_article&sys_id=e25437d7db7eec10b1b102d5ca9619b0

TRANSCRIPT:

The Role of Cyber Threat Intelligence (CTI) in a Cyber Security Strategy | Barry Richardson - NHS
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Speaker: Barry Richardson, Head of Information Security, NHS Blood and Transplant This session will be a loose foray into why CTI is so important to today’s organisations where the Internet has given all sorts of innovations and efficiencies, but where the Organisation is more exposed than ever to Cyber-crime. By socialising and nurturing awareness, I hope to demonstrate how an organisation can actively reduce its’ attractiveness as a target and thus become more ‘safe’. @inspiredBmedia || www.inspiredbusinessmedia.co.uk

TRANSCRIPT:

151: What a Threat Intelligence Analyst Does at Facebook & Why Coding Isn’t Necessary w/...
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

TRANSCRIPT:

HAVOC Day2: Demystifying COVID-19 Threat Intelligence
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Speakers: Milad Aslaner & Christos Ventouris / Microsoft The corona virus COVID-19 pandemic has created a global health crisis. Many of us are in self-quarantine or under government imposed lock-down. Organizations are moving as fast as possible to enable their employees to work from home in order to ensure some level of business continuity. With all this there has been a lot of discussions on COVID-19 related threat intelligence. But what is this really all about? Are threat actors really doing anything different? Come join this session where Milad Aslaner, Principal Security Program Manager, Microsoft Threat Protection and Christos Ventouris, Senior Security Program Manager, Microsoft Threat Protection help demystify and share insights about what’s really happening going on in the world of COVID-19 from an threat intelligence perspective. HAVOC is brought to you by HackersAcademy.com #StayHome & #JoinTheHAVOC

TRANSCRIPT:

BSides DC 2019 - Looking to the Past to Better Understand Threat Intelligence
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Genealogy is a search through your family history. As you progress through your research you can fall down into rabbit holes and uncover family secrets long since forgotten or hidden. This, amazingly, is not all that different from threat intel research. We will step through the process of finding a Revolutionary War ancestor and compare how it relates to finding an unknown threat actor. John Laycock (Threat Intel Manager at White Ops) Mr. Laycock has been involved with forensics for over 19 years. Starting out in the world of video forensics before moving over to computer forensics for the Department of Defense. He now works on the Satori Team for White Ops doing threat intel. Mr. Laycock lives in Maryland where he is a happily married father of 3 children and is a 5th generation Cubs fan who can't believe he finally got to see them win it all.

TRANSCRIPT:

#RomHack2020 - Raffaele Di Taranto, Vito Lucatorto - From 0 to Hero - Actionable Threat Intelligence
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Language: ITALIAN Raffaele Di Taranto & Vito Lucatorto - From 0 to Hero - Actionable Threat Intelligence What is it and why we need it in a Security Operation Center? Threat Intel is a service that any SOC must have in order to analyze, identify and correlate emerging cyber threats. The service is helpful for managing budget and monitoring evolving cyber scenarios, improve the correlation capabilities and manage indicators of compromise (IoCs) that can be used to prevent and detect malicious Threat Actors and CyberCrime that scampers on your own network. https://www.romhack.io/speakers-2020.html#ditarantolucatorto https://romhack.io/dl-2020/RH2020-slides-DiTaranto_Lucatorto.pdf (md5sum: c9aae1c974a176b29f09f8d01e97e123)

TRANSCRIPT:

Building a Large Scale Threat Intelligence System with OpenBSD Lawrence Teo
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Full description at https://www.bsdcan.org/events/bsdcan_2022/schedule/session/101-building-a-large-scale-threat-intelligence-system-with-openbsd/

TRANSCRIPT:

Are You Ready for Threat Intelligence: Behind the Scenes with FOR578
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

This webcast discusses SANS' new FOR578 - Cyber Threat Intelligence course with the two co-authors, Mike Cloppert and Robert M. Lee. The presentation help attendees understand if they are ready for threat intelligence, how it can be useful in their environments, and what they can expect from taking the class. Webcast participants learn about the direction of the class, what is covered in terms of content and labs, what useful prerequisites should be sought, and about the value of threat intelligence training. Additionally, lessons learned from student and instructor interactions are discussed to educate on the challenges posed to the threat intelligence community today. SANS FOR578 is one of the most anticipated new SANS classes available and this webcast will help you determine if you are ready to join the list of alumni

TRANSCRIPT:

Operationalizing Threat Intelligence for Collective Defense | Avkash Kathiriya | NULLCON Webinar
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Talk Abstract: ---------------- For defenders in the current situation, Threat Intel is all about IOCs which are more technical in nature and covers aspects that have a very short lifespan. By the time controls are put in place to thwart the technical IOCs, attackers change it and counter with new attacks. So, it becomes essential for defenders to continuously automate the Threat Intelligence actioning and harness the tactical information as well used by attackers and have countermeasures in place. By automating Threat Intel collection, analysis, and dissemination, we can deduce predictive intelligence providing greater visibility to the organizations while allowing them to anticipate and counter threats even before they attack. We will discuss how end-to-end threat intelligence automation in a closed trusted sharing environment could be used to operationalize actionable and relevant predictive intelligence by correlating, enriching, and analyzing threat data collected in real-time from a wide range of external and internal sources over a hub and spoke sharing model. We will also cover advanced automation strategies for the full threat intelligence lifecycle while detailing how mutual threat sightings could be used to identify and prioritize threats with precision confidence. Speaker Bio -------------- Information Security professional with overall 12+ years of experience in the Information Security domain. Currently heading Research and Innovation in Cyber Fusion and Threat Intelligence domain within security product startup Cyware Labs. Also Null Mumbai(Open security community) Chapter Leader. Experienced in SOC/CSIRT Management, Cyber Fusion, Red team, Cyber Resiliency, Threat Hunting, Threat Intelligence and research, Enterprise Security Architecture, Cyber Security governance, Network Security management. ----------------------------------------------------- #Threat #Defense #Security #Nullcon ----------------------------------------------------- Follow nullcon on Facebook: https://www.facebook.com/nullcon Twitter: https://twitter.com/nullcon LinkedIn: http://linkedin.com/company/nullcon/ Website: https://nullcon.net

TRANSCRIPT:

Cyber Threat Workshop - Defend Your Global Attack Surface: Threat Intelligence + XDR
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Special Edition: Defend Your Global Attack Surface: Threat Intelligence + XDR Join this special edition of RiskIQ’s Cyber Threat Workshop, where we will show how to extend security to global scale by leveraging inside and outside views of the attack surface. Our team will harness the power of the Microsoft XDR platform and combine RiskIQ’s unique threat intelligence to identify the most relevant threats and actionable indicators to accelerate incident response and modernize security operations. Using RiskIQ’s adversary-fingerprinting and threat tracking, Microsoft’s industry leading platform enables the world’s only adaptive XDR for pre- and post-breach response. Lab exercises will include contemporary threats, ransomware, nation state threats, vulnerabilities, extending OSINT investigations. Finally, RiskIQ and Microsoft threat specialists will show how to automate workflows to defend against threats today and threats yet to be deployed. Use cases 1:06:03 Microsoft Ransomware as seen in Microsoft Sentinel Automatically Enriching Sentinel Incident to speed up investigation 1:25:17 Reputation Score, Threat Intelligence & OSINT, and Cyber Threat Intelligence 1:41:09 Vulnerability Intelligence Is the vulnerability my organization or my supply chain? 40:59 OSINT Enrichment Investigation

TRANSCRIPT:

Consume and Produce: The Economics ofCyber Threat Intelligence Operations
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

SANS Cyber Threat Intelligence Summit 2023 Consume and Produce: The Economics ofCyber Threat Intelligence Operations Sherman Chu, Manager, Deloitte Balancing between consuming and producing while factoring in the limitations of people, processes, and technology (PPT) is a challenge all CTI teams face (vendor or end-user organizations). Some CTI shops might dedicate most of their resources to producing intelligence products, while others may apportion a majority of their capital to the consumption and application of finished intelligence. While there are no perfect formulas that can achieve CTI operational "equilibrium," we can explore the factors that can help us improve our resource allocation to empower CTI operations. This presentation explores the fundamental economics of CTI, and the factors organizations should consider when allocating people and technology in their CTI program and processes to bolster security. Specifically, we will examine the essential elements of CTI; what PPT means for CTI operations; the effects of CTI consumption/production; and explore ways to balance scarce people and technology resources to bolster CTI capabilities for your organization. View upcoming Summits: http://www.sans.org/u/DuS Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

TRANSCRIPT:

DocIntel: A Context-Centric Cyber Threat Intelligence Platform
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

SANS Cyber Threat Intelligence Summit 2023 DocIntel: A Context-Centric Cyber Threat Intelligence Platform Antoine Cailliau, Threat Researcher, Belgian Defence An increasing number of documents reporting cyber incidents, vulnerabilities, novel offensive and defensive techniques are shared on a daily basis among various public and private communities. This collective knowledge needs to be collected, processed and organized for the cyber threat intelligence (CTI) analysts to search and investigate. The large volume and diversity of knowledge available form a key challenge for analysts looking to transform the data into actionable knowledge. Expert staffing shortages, employee costs in cybersecurity industry, expensive fees for commercial data feeds and short deadlines in the cybersecurity fast-paced environment pushes organizations to find more efficient solutions to manage their threat intelligence. The proposed talk presents DocIntel, its key concepts and features, as well as how it is used in a large cyber threat intelligence team. DocIntel is an open-source knowledge platform for collecting, storing, processing, organizing, searching, and disseminating threat intelligence reports. A user-friendly web interface and command-line tools help CTI analysts to search and find the relevant information available, while controlling access to sensitive reports. Automated collection and pre-processing of documents reduce the workload of CTI analysts. View upcoming Summits: http://www.sans.org/u/DuS Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

TRANSCRIPT:

FOR578 Cyber Threat Intelligence Course Update - 6th day
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

In this short presentation Robert M. Lee goes over what's new in the 2021 update for FOR578 - Cyber Threat Intelligence. It will also focus on recent events and the application of cyber threat intelligence to them. Additionally, the course has moved from a 5 day course to a 6 day course to include a final capstone for students to work on which will be detailed in this webcast.

TRANSCRIPT:

Cyber Threat Intelligence for Defense and Intelligence
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

In addition to CNA (Computer Network Attack) and CNE (Computer Network Exploitation) national security and intelligence cyber warriors are responsible for CND, or Computer Network Defense, a daunting task given the massive haystack of security incidents and available threat data that must be sifted to deter, detect, defeat, and ultimately attribute planned cyber attacks in the deployment, or operations phases. Advanced analytics and Machine Learning are proving to be critical tools in achieving the necessary scale to handle these volumes of activity to discern the subtle, hidden indicators, i.e. the needles hiding in the haystack to preempt threats before they become problems. Join us for this informative session where we will discuss the cognitive capabilities of IBM’s Cyber Threat Intelligence, a unique capability that ‘learns’ and models the normal access and behavior patterns of privileged users and network activities to uncover hidden threats and automate insights, revolutionizing the way defense and intelligence analysts work.

TRANSCRIPT:

Threat Intelligence At Microsoft: A Look Inside - Cyber Threat Intelligence Summit 2017
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Threat Intelligence At Microsoft: A Look Inside Register for the 2018 Cyber Threat Intelligence Summit: http://www.sans.org/u/wOQ Sergio Caltagirone will dive deep into the operations, processes, and tools of the threat intelligence practice at one of the largest companies in the world, Microsoft. He will share how they do what they do to protect billions of customers worldwide while at the same time protecting their own multi-national organization from threats. This presentation will include their core philosophies which influence decisions around threat intelligence and some lessons and perspective for others building and managing their own threat intelligence practice. Sergio Caltagirone (@cnoanalysis), Director – Threat Intelligence & Analystics, Dragos, Inc.

TRANSCRIPT:

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

SANS Cyber Threat Intelligence Summit 2023 Luna Moth: A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure Oren Biderman, Senior Incident Response & Threat Hunting Expert, Sygnia Noam Lifshitz, Incident Response Team Leader, Sygnia Pivoting, or being able to move between indicators of compromise and up David Bianco's Pyramid of Pain to uncover the threat actor's tactics, techniques and procedures (TTPs) is a common practice in Cyber threat intelligence (CTI) operations. However, it is sometimes regarded more as a black art than a science. In this talk we will discuss a threat group dubbed "Luna Moth" that leverages call-back phishing techniques, as a case study to walk you through the process of leveraging indicators of compromise identified while responding to several security breaches to uncover the threat actor's infrastructure. The talk will include: 1. An overview of several breaches we investigated focusing on the attacker's modus operandi. 2. A breakdown of two techniques which were used to pivot between IOCs to uncover and track the threat actor infrastructure. 3. Example of employing automation to continuously monitor the threat actor's infrastructure. View upcoming Summits: http://www.sans.org/u/DuS Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

TRANSCRIPT:

Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Cyber Threat Intelligence (CTI) analysts must have ways of clustering adversary intrusions to find patterns and make meaningful recommendations to defenders. Incident responders and security personnel must be able to simply interpret those recommendations for actionable results. And yet the ways the community clusters activity and assigns names to it can be extremely confusing and seems inconsistent. Is APT A the same group as FANCY SQUIRREL? If not why not? And does it matter? What is a Threat Group? And how is that different than an Activity Group? Or a Campaign? This webcast presents concepts to consider when clustering intrusions and making assessments on adversary activity. It also highlights some unanswered questions in CTI for future exploration and some potentially problematic areas for analysts. Speaker Bio Robert M. Lee Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cybersecurity company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cybersecurity of critical infrastructure. For his research and focus areas, Robert was named one of the Passcode's Influencers, awarded EnergySec's Cyber Security Professional of the Year (2015), and inducted into Forbes' 30 under 30 for Enterprise Technology (2016). A passionate educator, Robert is the course author of SANS ICS515 - "ICS Active Defense and Incident Response" with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 - "Cyber Threat Intelligence" https://sans.org/FOR578 with its accompanying GIAC GCTI certification. He may be found on Twitter @RobertMLee

TRANSCRIPT:

DFIR Summit 2016: Leveraging Cyber Threat Intelligence in an Active Cyber Defense
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

sans.org/dfirsummit Two useful disciplines are cyber threat intelligence and active cyber defense. However, there is confusion around both of these areas that leads to a perception of hype and cost instead of vital tools for defenders to use. In the case of threat intelligence, many security companies have offered a range of threat intelligence products and feeds but there is confusion in the community as a whole as to how to maximize the value out threat intelligence. With active defense, there has been an attempt to brand this strategy as a hack-back or otherwise offense based practice whereas the strategy for an active defense has existed long before the word ‘cyber’ and is focused around practices such as incident response. This presentation will examine the current state of cyber threat intelligence and active cyber defense as well as provide strategies for leveraging proven cyber intelligence models within active cyber defense operations Speakers: Robert M. Lee (@robertmlee), Author & Instructor, SANS Institute Robert M. Lee is a SANS Certified Instructor and the course author of SANS ICS515: Active Defense and Incident Response and the co-author of SANS FOR578: Cyber Threat Intelligence. Robert is also CEO of Dragos Security, a non-resident National Cyber Security Fellow at New America focusing on policy issues relating to the cybersecurity of critical infrastructure, and a PhD candidate at Kings College London. For his research and focus areas, he was named one of Passcode’s Influencers and awarded EnergySec’s 2015 Cyber Security Professional of the Year. Robert obtained his start in cybersecurity in the U.S. Air Force where he served as a cyber warfare operations officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-ofits-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission. Erick Mandt, Analyst, Air Force Office of Special Investigations (AFOSI) Erick Mandt is a 25-year intelligence professional with broad experience in cyber counterintelligence, signals intelligence, intelligence analysis, and language analysis. He currently works as an analyst for the Air Force Office of Special Investigations (AFOSI) open-source intelligence team where he supports a full range of law enforcement and counterintelligence investigations and operations. Erick’s research and analytical interests focus on integrating critical thinking and structured analysis processes into active cyber defense operations. Prior to joining AFOSI, Erick served 20 years as a cryptologic linguist for the U.S. Navy. He is proficient in Russian, Bulgarian, Serbian-Croatian, and Macedonian. Erick has an undergraduate degree in Russian Area Studies from Excelsior College and an MS in Cybersecurity from Utica College. DFIR Summit Agenda:https://www.sans.org/event-downloads/43207/agenda.pdf DFIR Summit Brochure:https://www.sans.org/event-downloads/43207/brochure.pdf .

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Laila Shabir
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded March 5, 2017] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes Laila Shabir.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Anima Patil-Sabale
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded August 7, 2016] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes NASA's Anima Patil-Sabale.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star David Cole
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded August 11, 2018] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes David Cole.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Jenn Tran
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded October 17, 2015] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes Jenn Tran.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Nita Singh Kaushal
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded November 05, 2016] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes Miss CEO founder Nita Singh Kaushal.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Ali Guarneros Luna
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded June 4, 2016] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes NASA's Ali Guarneros Luna.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Brina Lee
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded August 7, 2016] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes Brina Lee.

TRANSCRIPT:

Keynote: A Recipe for Innovation - Greg Lotko, Senior Vice President and General Manager, Broadcom
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Keynote: A Recipe for Innovation - Greg Lotko, Senior Vice President and General Manager, Mainframe Division, Broadcom Innovators are increasingly embracing a mix of technologies along with an open approach to accelerate their businesses. Join Greg Lotko, SVP and GM, Broadcom Mainframe Software Division, as he shares how to leverage an open-first approach with the mainframe as the basis for innovation. Hear industry success stories and gain insights into applying “the right mix”. One that works for your developers – and across platforms. You’ll walk away with strategies that will supercharge the value you can achieve across your open mainframe ecosystem

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Anupam Pathak
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded July 25, 2015] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes Anupam Pathak.

TRANSCRIPT:

Broadcom Presents Design_Code_Build with Rock Star Wendy Okolo
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

[Recorded October 7, 2017] Broadcom Presents Design_Code_Build is an interactive STEM (science, technology, engineering, and math) experience that introduces Bay Area middle school students to the basic concepts of coding and applied mathematics in order to inspire them to pursue STEM in their future education and careers. Events are supported by tech professionals who act as role models and mentors, including special keynote speakers, or "rock stars," who kick off each event by sharing their personal stories and experiences. In this event Broadcom Presents Design_Code_Build the Computer History Museum welcomes NASA's Wendy Okolo.

TRANSCRIPT:

The NetOps Expert - Episode 4: Ensure Successful Upgrades With the Broadcom Weekend Upgrade Program
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Jeremy Rossbach, Head of DX NetOps Product Marketing and Matt Johnson, Head of Global Support for Broadcom Software, Agile Operations Division, discuss the Weekend Upgrade Program. Broadcom is dedicated to ensuring you are on the latest software releases with the most critical fixes, security enhancements and integrations. That’s why Broadcom Support has developed a Coordinated Upgrade Program that guarantees a successful upgrade of your DX NetOps platform.

TRANSCRIPT:

ONUG Fall 2020: Broadcom Presents Next-Gen Telemetry for Automated Triage & Reliable App Delivery
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Broadcom delivers an innovative approach to networking and network monitoring to manage the challenge of today’s data deluge, resulting from hyper-connectivity, that strains today’s network operations teams and increases triage times. Organizations need actionable analytics (not just raw data) from the network to ensure reliable application experience to their customers. . See how next-gen Broadcom silicon and telemetry is capable of processing vast amounts of data inside the chip itself to deliver advanced analytics, root cause analysis and improved SLA monitoring to ensure the delivery of an exceptional customer experience with reliable network performance.

TRANSCRIPT:

ONUG Fall 2020: Broadcom Presents How to Gain Single-Click Access to SD-WAN Health and Performance
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

SD-WAN is the hottest software-defined technology in the market today. With over 80% of enterprises deploying it, it promises to reduce costs, enhance security and streamline application delivery. But do you really want to add another monitoring tool to your arsenal of network management systems just to monitor another technology? At ONUG Fall 2020, Broadcom presented how to get easy, informative, one-click access to your multi-vendor SD-WAN deployments in a single dashboard so you have everything you need to realize the full investments of your SD-WAN initiatives. Broadcom has the most comprehensive, full stack visibility into the hottest SD-WAN vendors in the market today like Cisco (Viptela), VMware Velocloud, Cisco Meraki, Silver Peak, 128 Technology, Nokia Nuage and Versa Networks. For more information, visit broadcom.com/netops

TRANSCRIPT:

Broadcom MASTERS 2022 Awards
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

TRANSCRIPT:

Broadcom MASTERS International 2022 Highlights
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

TRANSCRIPT:

Greg Lotko, Broadcom Inc. | IBM Think 2020
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Greg Lotko, SVP & GM, Mainframe Division, Broadcom Inc., sits down with Dave Vellante for IBM Think 2020. #Think2020 #theCUBE https://siliconangle.com/2020/05/07/open-mainframe-important-part-new-cloud-world-says-broadcom-exec-think2020/ Open mainframe important part of new cloud world, says Broadcom exec As computing technology gains in speed and network agility, “old and well-known” mainframes need to keep up. And that’s what is happening now in a world of cloud, mobile, and open-source technology, according to Greg Lotko (pictured), senior vice president and general manager of the Mainframe Division at Broadcom Inc., which designs, develops and supplies semiconductor and infrastructure software solutions. “It’s fabulous that the mainframe has I/O rates and throughput that no other platform can match, but if you can’t connect that to the transactions that the customer is driving to it, then you’re not leveraging the value,” Lotko said. “So, you really have to think about it from a perspective of how you open up everything you possibly can on the mainframe while preserving that security.” Lotko spoke with Dave Vellante, host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the IBM Think Digital Event Experience. They discussed the intersection between the mainframe and an open approach, how DevOps fit into this world, and Broadcom’s position in this market following its CA Technologies Inc. acquisition in 2018. (* Disclosure below.) Connecting to multicloud architecture As the modern enterprise relies on an increasingly hybrid and multicloud IT architecture, the mainframe must connect through and to all of this, according to Lotko. Broadcom sees the cloud in a much more expansive way and the mainframe as an integral part of that. “We think about the customer’s cloud environment — the institution that we are dealing with, say it’s a financial institution, to their end customers, their cloud is however you interact,” he said. “If you’re checking an account balance, if you’re depositing in a check … you’re probably picking up a mobile device or a PC [and] you’re dealing with an edge server, you’re going back into distributed servers, and you’re eventually interacting with the mainframe, and then that’s got to come all the way back out to you.” The open approach of the mainframe must be wide, according to Lotko. “Open is also about opening up the [application program interfaces], opening up the connectivities, so that it’s easier to interact with the platform,” he explained. “Sometimes people think open is just about dealing with open source.” When opening the APIs, it is possible to bring several capabilities to the mainframe and embrace DevOps, Lotko explained. “We had a large European retail bank that actually used the Git Bridge that we work with — providing through Zowe — to connect into Endevor so they could leverage all the investments they had made in that existing technology over the years,” Lotko explained. “But [they] actually use the same kind of continuous integration and continuous delivery pipeline, the same interaction that they do across distributed platforms and mainframe together, and open up that experience across their development community.” Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of the IBM Think Digital Event Experience. (* Disclosure: TheCUBE is a paid media partner for the IBM Think Digital Event Experience. Neither IBM Corp., the sponsor for theCUBE’s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

TRANSCRIPT:

Clayton Donley, Broadcom Inc. & Greg Lotko, Broadcom Inc. | IBM Think 2019
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Clayton Donley Head of Security and Integration, Broadcom Inc. & Greg Lotko, SVP and GM, Mainframe Division, Broadcom Inc. sits down with John Furrier & Stu Miniman at IBM Think 2019 in San Francisco, CA. #Think2019 #Broadcom #theCUBE https://siliconangle.com/2019/02/15/qa-navigating-the-mainframe-renaissance-in-multicloud-think2019/ Q&A: Navigating the mainframe renaissance in multicloud Cloud computing has enabled unprecedented technology expansion and data proliferation, but not every workload was created to thrive off-premises. As enterprises explores custom solutions for the complex data sets that drive business strategy, the industry is seeing a revival of reliable, cost-efficient mainframe technology as a hub for hybrid cloud. Greg Lotko (pictured, right), senior vice president and general manager of the Mainframe Division at Broadcom Inc., and Clayton Donley (pictured, left), head of security and integration at Broadcom, spoke with John Furrier (@furrier) and Stu Miniman (@stu), co-hosts of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the IBM Think event in San Francisco. They discussed the value of on-premises infrastructure in hybrid strategy and how Broadcom is supporting streamlined multicloud in the wake of its CA Technologies acquisition at the end of 2018. (* Disclosure below.) [Editor’s note: The following answers have been condensed for clarity.] Furrier: You don’t have to kill the old to bring in the new; there’s a great abstraction around software now that’s making them work together. But the new stuff works really great. Your thoughts on this? Lotko: There’s a stat that 75 percent of the large enterprises in the world say they’ll have multicloud or hybrid environments by 2020. I think they all have it today. There are not workloads that work in isolation. You pick up your phone and check your balance; it’s going to kick off a transaction to an edge device that’s going to go through a network and maybe hit another server. Eventually, it’s going back to a mainframe. You want that interaction for the developers to be common across those platforms, yet you want them to be able to leverage the security of the underlying platform without having to know all the gory details — which is why it makes a lot of sense to use mainframe and distributed. If you look across the CA Technologies portfolio that Broadcom acquired, a lot of the capabilities that we have are the same capabilities that work across those environments so that the enterprise customers can interact with it one way. Miniman: How do I protect my data [in a] more heterogeneous world? Donley: Each transaction has to be protected. The [application programming interface] that gives you the ability to call that transaction from a mobile app needs to be protected. Then you need to be able to orchestrate that [the] same way every time, testing them the same way every time. Our value in digital infrastructure management [is] bringing all these pieces in cloud, multicloud, mainframe, [so] you have a way to operate [and] manage it, as well as for security. Miniman: Figuring out management of a heterogeneous environment has typically been a downfall. How how is the industry helping to solve that issue? Lotko: It’s fundamentally realizing that the core large enterprises in the world today are using mainframes. You’re going to have these systems interacting, and you recognize that we have to make it easier for people to interact. It’s what’s informing everything we do in our strategy and mainframe. We talk about open, frictionless and optimized; it’s all about the idea that mainframe system and those processes that we’re running, whether it’s DevOps, databases and tools, security, analytics, has to be open and able to interact with other people’s tools [and] platforms. You realize that this mainframe you’re spending 20 percent of your budget on is actually doing 70 percent of your processing — really cost effective. IBM had the mediation layer and we said, ‘If we got together, we could really start a renaissance around mainframe.’ We want our customers to find it easier to work with the mainframe and compete on the differentiation of underlying product, whether it be price or function. Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of the IBM Think event. (* Disclosure: Broadcom Inc. sponsored this segment of theCUBE. Neither Broadcom nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

TRANSCRIPT:

Broadcom (AVGO) Q4 FY 2022 Earnings Conference Call
LOW OKAY GOOD GREAT
0

MY SILO

DESCRIPTION:

Broadcom (AVGO) Q4 FY 2022 Earnings Conference Call #avgo #broadcom #earnings #avgoearnings #stocks Latest Earning Calls for your favorite investments! @1ConferenceCall Please like and subscribe! https://www.youtube.com/channel/UCtlB_k6YiWLMG6IoPbW3qYQ

TRANSCRIPT: