Board Member Jane Ginn has recently been honored by the Oasis Open organization. Each year, a select group of members are awarded the Distinguished Contributor designation due to their contribution to open source projects and/or open standards.
Jane Ginn of Cyber Threat Intelligence Network, Inc. serves as Secretary of the OASIS Cyber Threat Intelligence (CTI) and the Threat Actor Context (TAC) Technical Committees. She joined the CTI TC at its inception more than five years ago, and has contributed hundreds of documents to the CTI document repository. As an ardent supporter of the TC’s mission, Jane’s work has greatly impacted the CTI community.
OASIS is one of the most respected member-driven standards bodies in the world, OASIS offers projects – including open source projects – a path to standardization and de jure approval for reference in international policy and procurement. OASIS has a broad technical agenda encompassing cybersecurity, blockchain, privacy, cryptography, cloud computing and IoT – any initiative for developing code, APIs, specifications or reference implementations can find a home at OASIS.
The November Cybersecurity and Information Environment webinar is pleased to host the Cyber Resilience Institute’s (CRI) Doug DePeppe and Jane Ginn on November 17th at 3PM MST.
The CRI team will discuss the use of parallel hunting techniques – using social media and technical telemetry – to reveal disinformation and misinformation sources. Link analysis to conduct deep source checking helps analysts evaluate and connect influencers and trending hashtags to their sources, which is especially critical to reveal adversary nation-state influence operations, such as election interference.
Those interested will be able to join a Call to Action, facilitated by the National Cybersecurity Center (NCC), in which we explore opportunities to collaboratively increase cyber resilience.
Join CRI’s board member, Christopher Gorog as he talks with Ambareen Sirai, PhD, Professor and Director of Cybersecurity Education Research & Outreach Center Comp Science at Tennessee Tech and Founder/Chair at WiCyS . They discuss computer science and cybersecurity education, as well as the research that those in academia are doing regarding cybersecurity and how this research is used throughout the industry. You can also click on this link for previous New Cyber Frontier podcasts.
The Fourth Annual International Information Sharing Conference (IISC) is being held virtually on Wednesday, September 30 from 10 a.m. to 3 p.m. CST.
Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they come together to address information sharing issues impacting communities locally, regionally, nationally and abroad around the theme “Building Mature Information Sharing States and Communities”.
For detailed program and speaker information, please click on the following link.
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
You must be logged in to post a comment.