Thoughts on Applying Threat Intelligence in Practice
Organizations are overwhelmed by faceless adversaries who have exorbitant amounts of time, resources and patience enabling them to continue chipping away at an organization’s defenses under the anonymous cover that the internet provides them.
Threat intelligence services have industrialized the supply of intelligence about these adversaries with the purpose of helping organizations to know their enemies, how they operate, where they are coming from and the footprints that can be used to stop them. However, if this information is not applied properly within an organization’s operations, then it is simply data, not intelligence. Implementing a Cyber Threat Intelligence (CTI) Program is essential to getting the most out of the internal and external threat intelligence data being collected.
In this webcast, Ashwin Radhakrishnan, Product Manager at Anomali, and Charl van der Walt, Founder of SensePost, discuss:
- What are organizations buying versus what are they getting? And is it working?
- Turning data into intelligence
- Overall drivers for adopting a CTI program
- A deeper look at the fourth step of the CTI lifecycle: Analysis and Production
- Benefits of data visualization