LinkedIn tracking pixel

Using Intelligence to Analyze the Cyber Threat

Sat, Feb 28, 2015, 11:00am - 2:00pm

You are cordially invited to a presentation on the topic of

Open Source Cyber Security Intelligence Analysis:
Using Intelligence to analyze the Cyber Threat

Steven Savoldelli 
iSIGHT Partners

Saturday, February 28
11:00 AM – 2:00 PM

The Institute of World Politics
1521 16th Street NW
Washington, D.C. 20036
Parking map


This Saturday Career Seminar is sponsored by the Office of Career Services
and the Student Government Association. 

About the presentation 

Cyber threats are growing, and the need for intelligence to combat these threats in the government and private sector is also growing. Cyber Security Intelligence and Cyber Threat Intelligence are emerging fields where analysts like those who being trained at IWP are now needed analyze threats and find out who the attackers are, what their motivations are, and how to stop them.

Steven Savoldelli, a IWP student who works at iSIGHT Partners, will give a presentation on Cyber Threat Intelligence. This presentation will touch on the basics of cyber security and intelligence from an adversary perspective, will go over a couple case studies, and will discuss how “Open Source Cyber Security Intelligence Analysis” is conducted. Steven will also discuss careers in Cyber Threat Intelligence.

About iSIGHT Partners

iSIGHT Partners has been recognized as the leader in cyber threat intelligence. Through its established intelligence team made up of over 200 different experts in 16 different countries, the iSIGHT Partners team focuses exclusively on analyzing and understanding the global threat ecosystem, to include threat sources and the methodologies they employ, and partners with its customers’ security and intelligence operations to empower an intelligence-led security strategy that connects intelligence directly to their business.  One of their products is ThreatScape® cyber threat intelligence subscriptionsm, which provides the intelligence necessary to align a company’s security program with its business risk management goals and to defend proactively against new and emerging cyber threats.  See more at: