Menu

Operationalizing Threat Intelligence

  • Thursday, April 23, 2015 | 11:30 AM – 12:20 PM | West | Room: 3012

View all Sessions

In this peer-to-peer session, we'll discuss how security teams can operationalize threat intelligence and improve their overall security posture through Vulnerability Management, Network viability, Sans Top 20 Critical Controls and Recursive Network Indexing. We'll also discuss best practices, and what's working and what’s not working in your industry.

Participants

This document was retrieved from http://www.rsaconference.com/events/us15/agenda/sessions/1828/operationalizing-threat-intelligence on Tue, 21 Feb 2017 09:22:27 -0500.
© 2017 EMC Corporation. All rights reserved.