Operationalising Threat Intelligence

<h2>Technical Webinar: from early warning to breach investigation using Anomali and Splunk</h2> <p>Many cybersecurity conversations today are marked by a few common issues, for example: massive volumes of data, lack of analysts, and increasingly complex adversarial attacks. Most security operation center teams are focused on operational day-to-day tasks and responding to threats as they occur.</p> <p>Watch David Greenwood, Senior Solutions Engineer in a short webinar to discussing ways to make security analysts more effective and efficient:</p> <ul> <li>Using threat intelligence platform to facilitate the management of cyber threat intelligence and associated entities such as actors, campaigns, incidents, signatures, bulletins and TTPs</li> <li>How the integration of Anomali and Splunk enables Bi-directional flow of threat intelligence data for additional enrichment, correlation and analysis</li> <li>How analysts could be aided through automated IOC matching and customisable alerting against your security data in Splunk</li> <li>Creating dashboards detailing event data associated with IOCs allowing you to pivot on severity, type, classification, time.</li> </ul> <h3>Webinar Speakers:</h3> <div class="row"> <div class="col-sm-3 center"> <p><img alt="David Greenwood" class="img-fluid" src="https://www.anomali.com/images/uploads/landing/david.jpg" /></p> </div> <div class="col-sm-9"> <h4>David Greenwood<br /> <span style="font-weight:400;">Senior Solutions Engineer @Anomali</span></h4> <p>David Greenwood heads up Splunk Integrations at Anomali. He is an enthusiastic researcher, developer, blogger, and author. Prior to joining Anomali, David worked for Splunk helping some of the largest enterprise companies architect, build and implement cyber-security strategies.</p> </div> </div>

Watch Now

Success Message
No items found.