How to Implement Threat Intelligence

Presented by

Bryan Spano, CISSP and Chris Pace, Recorded Future

About this talk

We hear a lot of talk about threat intelligence and about how important it is to implement it, but we don’t get a lot of useful guidance on how a company that has yet to employ the technology can integrate it into an existing network. It's not sufficient to generate reports that have nuggets of crucial data mixed amongst the noise of network activity. You need to have staff that can analyze these reports and identify the crucial data, along with technology that makes it easier for crucial data to stand out. - What you need to know about how to implement threat intelligence - How to draw actionable information from the mass of data points that the technology generates About the speakers: Bryan Spano Cyber Security Leader/Professional, CISSP, PMP Experienced cyber leader with broad technical and business experience from military, federal law enforcement, and private sector roles. Project Management Professional (PMP), and Certified Information System Security Professional (CISSP) Chris Pace Technology Advocate, EMEA, Recorded Future Chris works for Recorded Future to engage and educate audiences on the power of real-time threat intelligence, using his extensive experience delivering security solutions to all kinds of organizations. Before beginning a career in information security, Chris trained as a Broadcast Journalist and also has worked in IT departments in the public and private sectors.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (59)
Subscribers (16851)
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human analysis or instant integration with existing security technology.