Enhancing Orchestration using Threat Intelligence

Logo
Presented by

Sean Drowsky, Threat Intelligence Engineer, ThreatQuotient and Jana Lind, Regional Sales Director, ThreatQuotient

About this talk

The aim of orchestration is to automate and optize reproducible tasks. In order to orchestrate these tasks successfully, the righ data needs to be used. Orchestrate better and more in depth using the right threat intelligence for your organization. In this webinar, we will focus on developing a malware playbook using prioritized threat intelligence. We will focus on the following three areas: 1. The process to enrich threat intelligence to provide better automation capabilities. 2. Automating your threat intelligence to give you analyst a good place to start. 3. Managing orchestration from your threat intelligence platform.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (0)
Subscribers (604)
Prioritize, automate & collaborate with a platform purpose-built for threat-centric security operations.