What lurks in the shadows? Can you find it? If so, can you share it?
Threat Intelligence is key to understanding your cybersecurity situation. But knowing your situation is not enough. One of the less common ways to benefit from threat intelligence is to share this information with other groups, which helps to reduce response time to events and enact preventative measures. Sharing takes one organization’s knowledge and spreads it across the entire industry to improve all security practices. We can defeat our adversaries by working as a team, not as individual organizations.
In this session, Scott Dowsett, Field CTO for Anomali, discusses the discovery of threat intelligence sharing and how organizations benefit from the community’s collective knowledge and experience.
Key topics covered include:
- Threat intelligence cycle
- The obstacles to information sharing
- Standards for the exchange of information
- Best practices for information sharing
- Creating your own ISAC
Threat intelligence sharing is a critical tool for the cybersecurity community; watch the on-demand webinar to learn how to start sharing today.