This Lab will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We'll review methods of threat intelligence platform selection and bake off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we'll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.
1: Learn a step-by-step approach to building a cyberthreat intelligence program.
2: Develop experience with core maturity assessment techniques.
3: Leave with a blueprint proven through years of creating programs.
Analytics, Intelligence & Response Security Strategy & Architecture
security consulting security intelligence security operations threat management critical infrastructure
Share With Your Community