Applying Threat Intelligence to Drive Control Assurance and Effectiveness

Logo
Presented by

Colin Whittaker with: Andrew Pendergast, ThreatConnect, Alan Liska, Recorded Future, and Aubrey Turner, Ping Identity.

About this talk

*Earn 1.5 CPE Credits on this webinar The frequency and severity of security incidents has risen as cyber criminals continually adapt their methods of attack to maximize profit, from mass-market approaches, to compromising as many organizations as possible, to more sophisticated attacks that target specific companies. This is why building an IT security strategy that has data-driven threat intelligence (TI) at its core is so critical. However, many organizations view pure threat feeds as their best opportunity to “get started” with threat intelligence, and then struggle to make sense of the massive quantities data. During this webinar, our panel of experts will discuss what types of intelligence will prove truly beneficial to your organization and how to apply it to drive IT control assurance and effectiveness, including how to: - Understand the value of different intelligence sources and how to work with them. - Gain fully contextualized alerts in real time with no false positives. - Effectively detect new threats, methods, and incidents. - Implement quality intelligence that informs your entire security strategy. - Consistently improve the efficiency and efficacy of your security operations.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (68)
Subscribers (49636)
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.