|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Ingesting data is easy. Turning it into intelligence is hard. Curating your own threat intel can be easy. But is sharing it risky? At a certain stage of maturity, every SOC will probably consider if they need a threat intel program. In this talk you will hear from an incident responder turned hunter turned intel manager as he talks through how threat intel helped mature his security posture.
1: Understand what level of threat intelligence you need.
2: Learn how to ingest data and convert it to threat intelligence.
3: Discover what to do with threat intelligence once you have it.
General security operations centre / blue team knowledge.