Adopting an Intelligence-Driven Security Model | Anomali

Webinar

Adopting an Intelligence-Driven Security Model Panel Discussion

View Now!

Optimize Your Threat Intelligence with these Best Practices

Intelligence-driven security is the model of the future. Too many organizations today only use cyber threat intelligence in a reactive mode, if at all. But threat intelligence can drive the way security teams create and tune their controls in the first place. 

In this on-demand webinar, industry leaders discussed how they use threat intelligence to drive their security operations, from architecture, to operations, all the way to response. The panel featured Steve Benton, VP of Anomali Threat Research and Scott Dowsett, Field CTO from Anomali, Mark Overholster, Systems Engineer, and James Pope, Director of Customer Training at Corelight. 

Key points of discussion include:

  • The most impactful type of intelligence in security operations 
  • Obtaining management buy-in for threat hunting
  • Operationalizing threat intelligence for cloud-first organizations
  • How encrypted traffic affects an organization’s ability to hunt threats
  • Best practices to avoid being overwhelmed by the amount of threat data

Watch the panel discussion to hear more recommendations for utilizing threat intelligence.