Posted on
in Presentations
Individuals are encouraged to share lessons they’ve learned from their experiences of using threat intelligence in a security operations environment. How they leveraged the TI; how they got value from TI; what pros and cons they would recommend.
Attendance is strictly limited to allow for a small group experience.
Share With Your Community