Bad Intelligence: Or How I Learned to Stop Buying and Love the Basics

Posted on in Presentations

Following the threat intelligence “gold rush,” buying every feed, tool and subscription available, organizations were left with a hefty bill for “bad intelligence.” We went back to the basics, developed and operationally tested a much simpler, cost effective, custom and process-driven framework to target intelligence directly on the highest risk threats to the business. Learn how to replicate it.

Learning Objectives:
1: Discover the end-to-end framework developed for cost-effective, custom integration of intelligence.
2: Learn how to implement custom workflows for the most valuable threat intelligence integration.
3: Walk away with real analytical artifacts and become confident in application to your business.

A general understanding of how threat intelligence is leveraged. Familiarity with how security operation centers operate.

Heather Gantt-Evans


Chief Information Security Officer, SailPoint

Larry Lipsey


Senior Consultant, EY

Brett Rogers


Manager, Cybersecurity, EY

Security Strategy & Architecture Analytics Intelligence & Response

threat management threat intelligence security operations security intelligence orchestration & automation



Share With Your Community