The State of Cyber Threat Intelligence: Part 1: How Cyber Threat Intelligence Is Consumed and Processed

  • Tuesday, 16 Aug 2016 1:00PM EDT (16 Aug 2016 17:00 UTC)
  • Speakers: Arabella Hallawell, Dave Shackleford, Javvad Malik, Chip Witt

How does the IT community gather and consume cyber threat intelligence (CTI) and do their CTI implementations provide value? This webcast, the first of a two-part series, will present part of the results of the second SANS Cyber Threat Intelligence Survey.

Part 1 looks at the state of cyber threat intelligence today, including the following:

  • How mature respondents' CTI programs are
  • How their CTI programs are organized
  • Who is aware of the CTI program, who uses the intelligence information gathered and how they use it
  • Whether or not they're achieving benefits from their CTI programs
  • What challenges they face in improving their programs

Part 2, held on Wednesday, August 17, focuses on the ways in which CTI programs are enabling organizations to improve their security programs and posture, as well as looking at respondents' future plans.

Be among the first to receive the associated whitepaper written by SANS Analyst and security expert Dave Shackleford.

View the associated whitepaper here.