Operationalize Threat Intelligence: Insights Into Leveraging Cyberthreat Intelligence (CTI) Programs
Featuring
About This Webinar
Today, security teams face an overwhelming barrage of complex and evolving threats. Defending against these threats starts with knowing them — this is where cyberthreat intelligence plays a role. However, with millions of indicators daily, security teams struggle to get the most value from their threat intel investments.
Cyberthreat intelligence (CTI) programs can significantly improve an organization’s ability to effectively detect, prevent and respond to security threats as long as you follow best practices. However, several factors must be considered to implement a successful CTI program.
-
Host Scott Bekker Webinar Moderator ActualTech Media
-
Featuring Kyle Wilhoit Director, Threat Research, Unit 42 Threat Intelligence Palo Alto Networks
-
Featuring Joshua Costa Director of Product Marketing Palo Alto Networks
What You'll Learn
- The pros and cons of CTI programs.
- How to start operationalizing threat intelligence.
- How Unit 42 and XSOAR TIM* help maximize efficiency.