top of page

Susan Peedylyakaal

Foundations of Building a Threat Intelligence Program

Bio:


With nearly 20 years of IT and cybersecurity experience, focused primarily on Cyber Threat Intelligence (CTI), V. Susan Peediyakkal draws on her significant knowledge from working with various federal, commercial, and international intelligence operations. Susan's career began in the US Air Force, where she served 20 years, active and reserve, before retiring in 2021. Most recently, she left a 3-year stint at NASA and is now a freelance consultant; her current contract is with one of the largest credit unions in the US. An active member of the cybersecurity community, Susan is the founder and director of BSides Sacramento, was named a 2020-2022 technologist fellow for the National Security Institute (NSI) at George Mason University, and was appointed to the advisory board for CSU Chico's Executive Program. In March 2018, Susan was named one of “10 Women in Security You May Not Know But Should” by one of the most widely-read cyber security news sites on the Web, Dark Reading.


Abstract:


This workshop will provide participants with a comprehensive understanding of the process and best practices for building a robust threat intelligence program. The workshop will cover various aspects of threat intelligence, including data collection, analysis, and dissemination. Participants will learn about the importance of threat intelligence in the current threat landscape and how to establish an effective program to mitigate risks and prevent attacks. Through case studies, participants will gain insights into the tools and techniques required for collecting, analyzing, and reporting on threat intelligence. They will learn how to identify, prioritize, and mitigate threats and work collaboratively with other stakeholders to build a comprehensive security posture. The workshop will also cover the importance of metrics and measurement in assessing the effectiveness of a threat intelligence program and how to develop a framework for continuous improvement. The workshop is ideal for security professionals, threat analysts, and anyone responsible for managing security risks. Participants will come away with a solid understanding of the key components of a successful threat intelligence program and how to implement them in their own organizations.

Susan Peedylyakaal
bottom of page