Menu

Operationalizing Threat Intelligence

  • Thursday, April 23, 2015 | 11:30 AM – 12:20 PM | West | Room: 3012

View all Sessions

In this peer-to-peer session, we'll discuss how security teams can operationalize threat intelligence and improve their overall security posture through Vulnerability Management, Network viability, Sans Top 20 Critical Controls and Recursive Network Indexing. We'll also discuss best practices, and what's working and what’s not working in your industry.

Participants

This document was retrieved from https://www.rsaconference.com/events/us15/agenda/sessions/1828/operationalizing-threat-intelligence on Thu, 29 Sep 2016 23:15:17 -0400.
© 2016 EMC Corporation. All rights reserved.