You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Tab 1 of 2.
Tab 2 of 2.
Intelligence 101: Establishing and Maturing an Effective Threat Intelligence Program Webinar
September 06, 2017 1:00 PM
September 06, 2017 2:00 PM
September 05, 2017 12:00 AM
MRO’s Security Advisory Council hosted a webinar on establishing and maturing an effective threat intelligence program. There are few other buzz words that get tossed around more than ‘intelligence’ when it comes to security and risk management. Unfortunately, much of what is understood about threat intelligence in the private sector has been shaped by vendor marketing material, and most vendors overlook the critical significance of how intelligence is created – the methodology. This approach limits threat intelligence capabilities and is a large part of why the threat intelligence market routinely focuses on narrow applications, such as cyber Indicators of Compromise.
This presentation provides a common understanding of security and risk intelligence, discusses the foundational aspects of an intelligence program, and explores use cases that can be implemented to establish or mature intelligence functions without requiring complex projects or expensive feeds.
Click here to view the webinar recording.
Estee J. Kolles
Intelligence 101 Establishing and Maturing an Effective Threat Intelligence Program PPT