Seattle Cybersecurity Leaders Dinner


February 29, 2024


Daniel’s Broiler Prime Steaks and Seafood
10500 NE 8th St, 21st Floor
Bellevue, WA, 98004



Join a select group of your peers as we connect after the FutureCon Seattle Cybersecurity Conference!

We’re excited to have you participate in this exclusive dinner featuring our Head of Threat Research, Scott Roberts where he’ll lead conversations on the latest trends, challenges organizations face as they try to defend their networks, validating cyber defense readiness against priority threats, and all things threat intelligence.

You’ll also have the opportunity to network with fellow peers to understand the challenges and solutions they are implementing within their organizations.

Don’t miss out on the opportunity to network with like-minded leaders – register today!

Please Note: Participation in this event is by invitation only.

Registration for this event has closed.

Scott Roberts


Head of Threat Research | Interpres Security

Scott Roberts is a security leader, analyst, software developer, and author. Scott is currently Head of Threat Research for Interpres Security and has led security teams and projects in the defense industrial base, GitHub, Apple, Splunk, and most recently Argo AI. He is also a researcher at Utah State University, where he is focused on Anticipatory Intelligence – tackling emergent problems in national and cybersecurity. Roberts has served as an advisory committee member for SANS CTI & DFIR Summits and has been a frequent speaker at SANS, BSides, and other industry conferences. He co-authored O’Reilly’s Intelligence Driven Incident Response with Rebekah Brown. Roberts is passionate about improving security via automation, especially on macOS, and developing open and closed source tooling in Python, Go, and Swift.

Scott’s Latest Project:

[Book] Intelligence-Driven Incident Response, 2nd Edition
by Rebekah Brown, Scott J. Roberts
Released June 2023

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you’ll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.

Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.

Book Signing for Intelligence-Driven Incident Response

© Interpres Security 2024