Operationalise Threat Intelligence: Pivoting & Validating
- How do you translate the data on hand into actionable threat intelligence?
- Are you able to gauge the effectiveness of your cyber security controls?
- How do you fare against the latest cyber security threats?
You have information at your fingertips. How do you understand from this information what is intelligence? How do you take the intelligence and operationalise it?
In this session we will explore how intelligence can be actionable. We will first learn how to decipher an intelligence report. Next, we will pivot and validate the findings within your environment. Finally we will review how effective the controls are, in capturing an attack.
Attend this session to become better equipped to drive buy-in and support from your key shareholders for the use of operationalising threat intelligence in your organisation.
|