Operationalizing Threat Intelligence in Network Defense


Posted on in Presentations

Threat intelligence is a popular topic, but often consists of either lists of indicators or written reports that must be translated or imported into the security environment. How should practitioners best utilize threat intelligence, and what expectations should exist for this resource in modern security operations? Attendance is strictly limited to allow for a small group experience.
Participants
Joe Slowik

Participant

Senior Manager, Threat Intelligence & Detections, Gigamon


Share With Your Community