InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Ensuring Threat Intelligence Remains Intelligent

Presented by

Charles Kolodgy, Principal | Security Mindsets LLC

About this talk

How do you know the dangers you face regarding cybersecurity? A threat intelligence program is key to understanding the existing dangers. However to be truly effective, threat intelligence must be relevant to your situation and environment. Ensuring that threat intelligence is indeed intelligent in regards to your specific needs requires more than a basic data feed. The presentation from industry thought leader Charles Kolodgy will provide useful insight and information designed to allow you to align your threat intelligence with your specific needs by incorporating other components that complement threat intelligence. Join this discussion to learn: - What is threat intelligence and the specific value it provides. - How the MITRE ATT@CK framework is a useful tool for threat intelligence. - Attack surface management is a valuable component of threat intelligence. - Understand how threat intelligence and attack surface can be reconciled. - How to evaluate the various cybersecurity threat intelligence offerings available. - Harmonizing threat intelligence, attack surface, vulnerabilities, and business requirements when making cybersecurity decisions
Information Security

Information Security

259136 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics