Bad Intelligence: Or How I Learned to Stop Buying and Love the Basics
Download pdf
Download pdf
Download pdf
Following the threat intelligence “gold rush,” buying every feed, tool and subscription available, organizations were left with a hefty bill for “bad intelligence.” We went back to the basics, developed and operationally tested a much simpler, cost effective, custom and process-driven framework to target intelligence directly on the highest risk threats to the business. Learn how to replicate it.
Learning Objectives:
1: Discover the end-to-end framework developed for cost-effective, custom integration of intelligence.
2: Learn how to implement custom workflows for the most valuable threat intelligence integration.
3: Walk away with real analytical artifacts and become confident in application to your business.
Pre-Requisites:
A general understanding of how threat intelligence is leveraged. Familiarity with how security operation centers operate.
Learning Objectives:
1: Discover the end-to-end framework developed for cost-effective, custom integration of intelligence.
2: Learn how to implement custom workflows for the most valuable threat intelligence integration.
3: Walk away with real analytical artifacts and become confident in application to your business.
Pre-Requisites:
A general understanding of how threat intelligence is leveraged. Familiarity with how security operation centers operate.