1. Moscone West 2009

Want to detect threats in your organization? Stop reading every feed and curate your threat intel and content so they actually work for your security architecture. By managing meaningful threat intelligence so the external intel maps to internal threat models and curating your content sensibly, you can create a high-functioning SOC that both detects and defends against cyberattacks.

Learning Objectives:
1: Understand that effective threat intel is not just ingesting more indicators.
2: Understand a pragmatic approach to threat intel management.
3: Leave with an actionable approach to improve your SOC through content curation.

Download pdf