Select Page

Wednesday, 20 Jan @ 11:30 PM

DESCRIPTION

For years, cyber threat intelligence has been focused on collecting tactical Indicators of Compromise (IOCs) such as domains, IP addresses, & hashes. But what’s the point of collecting tactical information that your team can’t act on or map to what’s happening in your environment?As a security leader, you need more from your cyber threat intelligence program.

AGENDA / DISCUSSION TOPICS

– Explore how you can apply the intelligence lifecycle process, and automation, to deliver operational and strategic intelligence
– Get best practices and practical use cases that you can apply to level up your threat intelligence program
– Learn how you can drive better decisions throughout your organization and maximize ROI from your threat intel investments

PARTICIPANTS

RYAN CLOUGH:SR,Product Manager
KYLE WILHOIT:SR Manager, Threat Research
PETR KEASS : Contributing Editor

Webinar/Workshop organized by: InformationWeek

iSeekh Disclaimer

We list events as per details provided by the organizer. We are NOT responsible or liable in case of any non-availability or deficiency of the service provided, including any paid event/services.