{"id":12577,"date":"2019-01-04T11:19:12","date_gmt":"2019-01-04T16:19:12","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/sas-2019-podcast-bartholomew\/12577\/"},"modified":"2020-09-08T13:01:43","modified_gmt":"2020-09-08T09:01:43","slug":"sas-2019-podcast-bartholomew","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/sas-2019-podcast-bartholomew\/12577\/","title":{"rendered":"SAS preview: Brian Bartholomew"},"content":{"rendered":"<p>It is that time of year again, and #TheSAS2019 will be here before we know it. This year\u2019s conference is in Singapore, and as usual, the presenters will showcase a lot of interesting research. Attendees can also learn in training sessions about a wide variety of topics from our experts on the Global Research and Analysis Team.<\/p>\n<p>In this podcast, I sit down with Brian Bartholomew, who will conduct a training session, to discuss what he envisions for this year\u2019s edition of the Security Analyst Summit. His training, called <em>The Good and the GReAT \u2014 Stepping up Your Threat Intelligence Game<\/em>, will be held with Brian Candlish of Telstra Threat Labs and will focus on:<\/p>\n<ul>\n<li>Concepts of threat intelligence<\/li>\n<li>The intelligence life cycle<\/li>\n<li>Defining intelligence requirements<\/li>\n<li>Collecting and processing data<\/li>\n<li>Maximizing data through automation<\/li>\n<li>Open-source\/custom tools<\/li>\n<li>Threat hunting in large security data sets<\/li>\n<li>Intelligence reporting<\/li>\n<li>Dealing with biases<\/li>\n<li>Using estimative language<\/li>\n<\/ul>\n<p>Each day will end with large hands-on labs.<\/p>\n<p>To sign up for Brian\u2019s training or to buy tickets for #TheSAS2019, please <a href=\"https:\/\/sas.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_SAS2019_organic&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_link_blog_SAS2019%23the-good-and-the-great-stepping-up-your-threat-intelligence-game\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">click here<\/a>.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/8134106\/height\/90\/theme\/custom\/thumbnail\/yes\/preload\/no\/direction\/backward\/render-playlist\/no\/custom-color\/000000\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this Security Analyst Summit preview, Jeff sits down with Brian Bartholomew of GReAT to discuss the conference and his upcoming training on threat intelligence.<\/p>\n","protected":false},"author":636,"featured_media":12578,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1993,1994,575,444,337,333,1995,1552],"class_list":{"0":"post-12577","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-thesas2019","10":"tag-brian-bartholomew","11":"tag-great","12":"tag-podcast","13":"tag-sas","14":"tag-security-analyst-summit","15":"tag-the-sas-2019","16":"tag-threat-intelligence"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/sas-2019-podcast-bartholomew\/12577\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/sas-2019-podcast-bartholomew\/14995\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sas-2019-podcast-bartholomew\/16926\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sas-2019-podcast-bartholomew\/15124\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas-2019-podcast-bartholomew\/25264\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas-2019-podcast-bartholomew\/21883\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas-2019-podcast-bartholomew\/21829\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12577"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12577\/revisions"}],"predecessor-version":[{"id":17354,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12577\/revisions\/17354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12578"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}