Concrete Steps to Deploy an Effective Threat Intelligence Capability

Presented by

Eric Olson

About this talk

Protecting your business — including its information and intellectual property, physical infrastructure, employees, and reputation — has become increasingly difficult. Among thought leaders and advanced organizations, the consensus is now clear. To adequately protect company assets and ensure business continuity, organizations must be more proactive and make effective use of threat intelligence. But on a practical level, how can you do this? We’ll discuss practical considerations evaluating what to build and what to buy, how to define and manage the scope and mission of the Threat Intelligence program, and operate it for effect and business impact – regardless of your company size or budget. What you’ll learn: •How the business objectives define the scope and mission of the program •Developing metrics that support the mission and communicate value •How to build a spend plan and articulate budget needs •Build, Buy and Hybrid implementation models •Why skilled cyber analysts are a critical component of any program, and what skills they will need Register now!

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (57)
Subscribers (6434)
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation. By addressing risks across structured Indicators of Compromise (IoCs), unstructured and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners. Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.