Individuals are encouraged to share lessons they’ve learned from their experiences of using threat intelligence in a security operations environment. How they leveraged the TI; how they got value from TI; what pros and cons they would recommend. Attendance is strictly limited to allow for a small group experience.
Presenters