Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and Response

  • Thursday, 19 Feb 2015 1:00PM EST (19 Feb 2015 18:00 UTC)
  • Speakers: Will Gragido, Dave Shackleford, Morey Haber, Adam Meyer

Click here for Part I

When it comes to the use of cyberthreat intelligence, organizations are scrambling to deploy and use these capabilities, even though they don't even vaguely understand what cyberthreat intelligence is or how it ties in with their defensive and response systems. As a follow up to the SANS Analytics and Intelligence Survey, this survey was designed to define cyberthreat Intelligence, how it's used (as service, on premise, both) and whether it lives up to its promise.

This webcast is part of a two-part cyberthreat intelligence survey webcast. Part 1 will focus on defining cyberthreat intelligence and exploring the tools and standards involved in using intelligence to enhance security. This webcast will focus on using cyberthreat intelligence to improve incident detection and response.

Attend this webcast and learn:

  • Best practices in using intelligence for prevention, detection, and response
  • How to use intelligence in cloud and virtual environments

Be among the first to receive the associated whitepaper written by Dave Shackleford, with advice by Stephen Northcutt.

View the associated whitepaper.

Learn More and Register for the Cyber Threat Intelligence Summit!