Operationalizing Threat Intelligence in Network Defense

Posted on in Presentations

Threat intelligence is a popular topic, but often consists of either lists of indicators or written reports that must be translated or imported into the security environment. How should practitioners best utilize threat intelligence, and what expectations should exist for this resource in modern security operations? Attendance is strictly limited to allow for a small group experience.
Joe Slowik


Senior Manager, Threat Intelligence & Detections, Gigamon

Share With Your Community