Menu

Operationalizing Threat Intelligence

  • Thursday, April 23, 2015 | 11:30 AM – 12:20 PM | West | Room: 3012

View all Sessions

In this peer-to-peer session, we'll discuss how security teams can operationalize threat intelligence and improve their overall security posture through Vulnerability Management, Network viability, Sans Top 20 Critical Controls and Recursive Network Indexing. We'll also discuss best practices, and what's working and what’s not working in your industry.

Participants

This document was retrieved from https://www.rsaconference.com/events/us15/agenda/sessions/1828/operationalizing-threat-intelligence on Sat, 10 Dec 2016 09:38:47 -0500.
© 2016 EMC Corporation. All rights reserved.