Western Threat Day Sessions

Watch Now

Register Now

Success Message
<h2>Learn About Emerging Threats and Innovative Threat Intelligence Strategies</h2> <p>This virtual threat briefing brought everyone together to discuss threat intelligence challenges, requirements, and best practices. Industry experts and threat intelligence thought-leaders provided briefings on today’s threat landscape, adversaries, and their attack techniques.</p> <p>Watch all 3 sessions on-demand and walk away with recommendations for your teams and tangible information to research within your own environments.</p> <p><strong>Building Effective Cyber Threat Intelligence Programs</strong><br /> AJ Nash, Senior Director of Cyber Intelligence Strategy, Anomali</p> <p><strong>Practical Use Cases for Compromised Credential Monitoring</strong><br /> Scott Renna, Solutions Architect, Flashpoint</p> <p><strong>Analysis of an Attack Surface: 5 Ways Threat Actors Target the Digital Enterprise</strong><br /> Josh Mayfield, Product Marketing, RiskIQ</p> <h3>Sponsors</h3> <div class="anomali-scroller"> <ul class="list-inline pb-3"> <li class="list-inline-item mt-3"><img alt="Anomali" class="xlarge anomali-scroller-image" src="{assets_3983:https://www.anomali.com/images/uploads/landing/anomali-white.png}" /></li> <li class="list-inline-item mt-3"><img alt="Flashpoint" class="xlarge anomali-scroller-image" src="{assets_3984:https://www.anomali.com/images/uploads/landing/flashpoint-white.png}" /></li> <li class="list-inline-item mt-3"><img alt="RiskIQ" class="xlarge anomali-scroller-image" src="{assets_3985:https://www.anomali.com/images/uploads/landing/riskiq-white.png}" /></li> </ul> </div>
No items found.