Practical Implementations of a Threat Intelligence Program


Posted on in Presentations

Ingesting data is easy. Turning it into intelligence is hard. Curating your own threat intel can be easy. But is sharing it risky? At a certain stage of maturity, every SOC will probably consider if they need a threat intel program. In this talk you will hear from an incident responder turned hunter turned intel manager as he talks through how threat intel helped mature his security posture.

Learning Objectives:
1: Understand what level of threat intelligence you need.
2: Learn how to ingest data and convert it to threat intelligence.
3: Discover what to do with threat intelligence once you have it.

Pre-Requisites:
General security operations centre / blue team knowledge.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Craig Hall

Participant

Manager, Threat Analytic Cell, IAG


Share With Your Community