Menu

Operationalizing Threat Intelligence

  • Thursday, April 23, 2015 | 11:30 AM – 12:20 PM | West | Room: 3012

View all Sessions

In this peer-to-peer session, we'll discuss how security teams can operationalize threat intelligence and improve their overall security posture through Vulnerability Management, Network viability, Sans Top 20 Critical Controls and Recursive Network Indexing. We'll also discuss best practices, and what's working and what’s not working in your industry.

Participants

This document was retrieved from http://www.rsaconference.com/events/us15/agenda/sessions/1828/operationalizing-threat-intelligence on Sat, 18 Nov 2017 06:43:00 -0500.
© 2017 EMC Corporation. All rights reserved.