InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Maximize Threat Intelligence to Maximize Your SOC

Presented by

Forrester Sr Analyst, Brian Kime and Authentic8 National Security Engagement Lead, Matt Ashburn

About this talk

Two cybersecurity veterans discuss best practices for mitigating risks while maximizing the value of your investments in threat intelligence. Featuring guest speakers: -Forrester Sr Analyst Brian Kime, covering cyber threat intelligence, vulnerability risk management, and industrial control system security -Authentic Engagement Lead Matt Ashburn, former CIA Cyber Security Officer and National Security CISO at the White House In this conversational webinar, Brian and Matt share real-life stories from their years in both private sector companies and government organizations. Hear them discuss: -Why OpSec is important to the CISO and what companies can do to help their analysts collect intel without exposing their identities or compromising their missions -The risks involved in using corporate networks and devices for intel collection -Expert advice on the types of tools and frameworks that can give your SOC an advantage over adversaries
Silo by Authentic8

Silo by Authentic8

1375 subscribers2 talks
Enable anyone, anywhere to experience the web without risk.
View our webinars to learn how the world’s most at-risk organizations access and research the open, deep and dark web remotely and without risk. The Silo Web Isolation Platform separates the things you care about like apps, data, and devices, from the things you cannot trust like external websites, users and unmanaged devices. Silo executes all web code in a secure, isolated environment that is managed by policy, to provide protection and oversight.
Related topics