Applying Past Lessons for Intel-Driven Identity Threat Detection

Posted on in Presentations

Step into a DeLorean! This session will apply past lessons in hopes of a better future for identity threat detection and will review the top identity attacks observed in incident response over the past two years, highlighting the importance of collaboration between identity and access management (IAM), security operations, and cyber threat intelligence (CTI).
Recommended Reading Available in Our Bookstore

The Mighty Threat Intelligence Warrior by Nicole Hoffman

Nicole Hoffman


Security Investigator, Cisco Talos

Michael Marriott


VP of Product Marketing, Harmonic Security

Share With Your Community