InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to Use Cyber Threat Intelligence to Eliminate Blind Spots

Presented by

Melinda Marks, Senior Analyst, ESG | Jason Steer, Chief Information Security Officer, Recorded Future

About this talk

The explosion in cloud adoption, digital transformation, and remote work – combined with a never-ending amount of phishing and ransomware attacks – are shaping the evolution of threats. But it’s difficult adapting security strategies to mitigate risks, especially given the varying skillsets that exist within an infosec team, burnout, competing priorities, and a lack of visibility into blind spots. In this Fireside Chat, Melinda Marks, Senior Analyst at ESG, and Jason Steer, CISO at Recorded Future, explore the top security trends you should keep top of mind, how you can use threat intelligence to stay 10 steps ahead, and much more. Learn: • How you can mitigate your risk of ransomware • What ‘good’ security needs to evolve to • Threat intelligence use cases • Questions to ask when using threat intelligence • Advice for security teams and key mistakes to avoid • Why you should rehearse your incident response plan • Cybersecurity and the Russia-Ukraine war: Why it’s best to operate from a worse-case scenario POV
Recorded Future Deactivated

Recorded Future Deactivated

17117 subscribers0 talks
Threat Intelligence Powered by Machine Learning
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human analysis or instant integration with existing security technology.
Related topics