Practical Implementations of a Threat Intelligence Program

Posted on in Presentations

Ingesting data is easy. Turning it into intelligence is hard. Curating your own threat intel can be easy. But is sharing it risky? At a certain stage of maturity, every SOC will probably consider if they need a threat intel program. In this talk you will hear from an incident responder turned hunter turned intel manager as he talks through how threat intel helped mature his security posture.

Learning Objectives:
1: Understand what level of threat intelligence you need.
2: Learn how to ingest data and convert it to threat intelligence.
3: Discover what to do with threat intelligence once you have it.

General security operations centre / blue team knowledge.
Craig Hall


Manager, Threat Analytic Cell, IAG

Analytics Intelligence & Response


Share With Your Community