In this interactive session, learn how to use an intelligence analysis tool to hunt for cyber and physical threats. From national security and defense, to cyber and enterprise-wide threats, IBM i2 combines internal and external data sources to give you complete visibility through its powerful link analysis engine. Combine network data, social media, HR records, and other sources to see your full threat landscape in one solution.