Some of the most important intelligence resides right inside your own organization. Taking a closer look at your SIEM, internal telemetry, user lists etc. provides visibility into your key business processes and expected behaviors, which is pertinent to gathering threat intelligence successfully. You cannot protect what you do not know or understand. Correlating this internal intelligence with external intelligence sources is the most powerful way to provide high confidence and value information for informed decision making.
AJ Nash, Director of Cyber Intelligence Strategy at Anomali, and John Pironti, President at IP Architects will cover:
NOTE: A valid email address is required to receive your requested asset.