Download pdf
Download pdf
Following the threat intelligence “gold rush,” buying every feed, tool and subscription available, organizations were left with a hefty bill for “bad intelligence.” We went back to the basics, developed and operationally tested a much simpler, cost effective, custom and process-driven framework to target intelligence directly on the highest risk threats to the business. Learn how to replicate it.

Learning Objectives:
1: Discover the end-to-end framework developed for cost-effective, custom integration of intelligence.
2: Learn how to implement custom workflows for the most valuable threat intelligence integration.
3: Walk away with real analytical artifacts and become confident in application to your business.

A general understanding of how threat intelligence is leveraged. Familiarity with how security operation centers operate.