Threat Intel and Content Curation Organizing the Path to Successful Detection


Posted on in Presentations

Want to detect threats in your organization? Stop reading every feed and curate your threat intel and content so they actually work for your security architecture. By managing meaningful threat intelligence so the external intel maps to internal threat models and curating your content sensibly, you can create a high-functioning SOC that both detects and defends against cyberattacks.

Learning Objectives:
1: Understand that effective threat intel is not just ingesting more indicators.
2: Understand a pragmatic approach to threat intel management.
3: Leave with an actionable approach to improve your SOC through content curation.

Participants
Justin Monti

Participant

CTO, MKACyber

Mischel Kwon

Participant

CEO, MKACyber

Analytics Intelligence & Response

practitioner perspectives security architecture security operations threat management hackers & threats


Topic

Subtopic


Share With Your Community