Organizations must know what intelligence to apply, where to get that intelligence from, and how they can use cyber threat intelligence (CTI) effectively. In this second part of a two-part webcast, attendees will learn about how respondents are using CTI and what the future holds. Specifically, they'll explore the following:
Be sure to register for the first part of the results webcast being presented on Tuesday, February 5 at 1 PM Eastern to learn about the value of CTI, CTI requirements and the inhibitors to growing a CTI program and staffing it.
Webcast attendees will be among the first to receive the associated whitepaper written by Robert M. Lee and Rebekah Brown.