How To Build a Threat Intelligence Program: The Power of Tagging with Air Canada

<h2>Air Canada Provides A Power-User’s Perspective on the Value of Tagging in Anomali—Featuring iON</h2> <p><strong>Watch On-Demand</strong></p> <p>This webcast is the first in a series that demonstrates best practices for building effective threat intelligence programs with Anomali. You’ll hear from industry experts, Anomali power-users, and internal employees alike.</p> <p>Not all threat intelligence platforms are created equal. While many allow you to ingest threat intelligence feeds from different sources, tagging data is a critical next step where some platforms miss the mark. Without the ability to tag data security teams lose the ability to add context to indicators.</p> <p>If you’re interested in increasing the efficiency of your security analysts, start with the building blocks of threat hunting. In this webcast, Robert Zagorsky, President, Principal at iON provides a unique perspective on going beyond importing threat intelligence to the importance of managing and operationalizing your intel.</p> <p>Then, Kyle Howson, CSOC Specialist, IT & Cyber Security Operations, of Air Canada walks through the different ways to leverage tagging in the Anomali threat intelligence platform, building on his firsthand experience as a power-user.</p> <p>We discuss:</p> <ul> <li>The benefits of tagging threat intelligence</li> <li>How to build out tagging frameworks with Anomali</li> <li>High value use cases leveraging intel tagging</li> </ul> <p><strong>Uncover the power of tagging and put it to work for your security team today!</strong></p>

Watch Now

Success Message
No items found.