Foundations for a Strong Threat Intelligence Program


Posted on in Presentations

This Lab will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We'll review methods of threat intelligence platform selection and bake off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we'll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.

Learning Objectives:
1: Learn a step-by-step approach to building a cyberthreat intelligence program.
2: Develop experience with core maturity assessment techniques.
3: Leave with a blueprint proven through years of creating programs.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Jeffrey Bardin

Participant

Chief Intel Officer, Treadstone 71

Anthony Nash

Participant

Director of Cyber Intelligence Strategy, Anomali


Share With Your Community