company overview
Anomali® delivers intelligence‐driven cybersecurity solutions, including Anomali ThreatStream®, Anomali Match™, and Anomali Lens™. Private enterprises and public organizations use Anomali to gain unlimited visibility, speed time to detection, and constantly improve security operations. Anomali customers include more than 1,500 global organizations, many of the Global 2000 and Fortune 500, and large government and defence organizations around the world. Founded in 2013, it is backed by leading venture firms including GV, Paladin Capital Group, Institutional Venture Partners, and General Catalyst. Learn more at: www.anomali.com
Biography
Mark Alba is Chief Product Officer at Anomali, joining the company in April 2020. Mark has over 20 years of experience building, managing, and marketing disruptive products and services. His proven track record includes bringing to market the security industry’s first fully-integrated appliance firewall, leading the integration of global threat intelligence into perimeter security technologies, and introducing advanced analytics in support of cybersecurity operations. Throughout his career, Mark has been on the front lines of innovation, leading product efforts in both start-up and large enterprise organizations including Check Point Technologies, Security Focus, Symantec, and Hewlett Packard Enterprise. Mark holds a bachelor’s degree in economics from the University of Pennsylvania.
Speech Topic & Synopses
The Time Is Now for a Cyber Resilience Using Intelligent Detection at Scale
Explore how a lack of automation is holding your threat intelligence, security operations, and the rest of your organisation back. Many of today’s organisations understand the value of threat intelligence but are running into challenges when leveraging it. Anomali’s Chief Product Officer, Mark Alba shares ideas on how to change that. This lack of automation and actionable threat intelligence may be preventing enterprises from developing the fully functional Cyber Fusion Centers they require to establish cyber resilience. Manual threat intelligence operations pose serious business risks, such as missing high-priority threat alerts while sorting through the noise. Explore the state of threat intelligence in your enterprise, examine how the lack of automation hinders your threat detection efforts, and are you missing out on business benefits that could be realised through automation? Understand the importance of continuous monitoring and automated intelligence and simple ways you can get started.