Posted on
in Presentations
Following the threat intelligence “gold rush,” buying every feed, tool and subscription available, organizations were left with a hefty bill for “bad intelligence.” We went back to the basics, developed and operationally tested a much simpler, cost effective, custom and process-driven framework to target intelligence directly on the highest risk threats to the business. Learn how to replicate it.
Learning Objectives:
1: Discover the end-to-end framework developed for cost-effective, custom integration of intelligence.
2: Learn how to implement custom workflows for the most valuable threat intelligence integration.
3: Walk away with real analytical artifacts and become confident in application to your business.
Pre-Requisites:
A general understanding of how threat intelligence is leveraged. Familiarity with how security operation centers operate.
Learning Objectives:
1: Discover the end-to-end framework developed for cost-effective, custom integration of intelligence.
2: Learn how to implement custom workflows for the most valuable threat intelligence integration.
3: Walk away with real analytical artifacts and become confident in application to your business.
Pre-Requisites:
A general understanding of how threat intelligence is leveraged. Familiarity with how security operation centers operate.
Share With Your Community