Implementing Threat Intelligence

Thursday, December 12, 2019

11:00 a.m. ET/ 8:00 a.m. PT

Earn CPE credit for attending

 
A company's threat intelligence environment often is a reflection of the overall maturity of existing network security. It generally requires a relatively mature network environment to support both proactive and reactive threat intelligence.

This virtual conference will review what you need to have in place before launching a threat intelligence program, then how to select which commercial feeds to use along with how to implement open source intelligence.

 

Virtual Conference Sessions:

Keynote — Implementing threat intelligence
 

Prioritizing investigations with domain & DNS-based adversary intelligence

sponsored by:
 

 

Bringing useful threat intelligence to every part of your organizationadversary intelligence

sponsored by:
 

 

Threat intel isn’t one size fits all

sponsored by:
 


Click here to view session content         

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)

Submit

Presenter
KEYNOTE SPEAKER: Todd Hillis
Global Intelligence Officer
International Association of Certified ISAOs (IACI)
Presenter
Jackie Abrams
Principal Product Manager
DomainTools
Presenter
Jackie Leombruno
Customer Success Manager
ThreatConnect
View Biography
Presenter
Allan Liska
Senior Security Architect
Recorded Future
View Biography