Implementing Threat Profiling for Network Defense

Posted on in Presentations

Threat intelligence and active defense are all the rage—but meaningless if you don’t know your threats and how they apply to your environment. In this P2P session, attendees will discuss methods to determine the threat environment, identify visibility gaps and orient defense to likely risks. Participants will leave with a roadmap for implementing threat-focused defense to their networks.

Learning Objectives:
1: Explore how to orient network defense activities to the threat environment.
2: Identify critical assets and chokepoints based upon network and threats.
3: Develop an iterative process for threat profiling and network defense strategy.
Joe Slowik


Senior Manager, Threat Intelligence & Detections, Gigamon

Share With Your Community