Threat Intelligence & Incident Response
Topics
Types of Content
The Shadow Brokers – Details on Leaked Cyberintelligence Tools and VulnerabilitiesThis Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this... |
|
WikiLeaks – Vault 7 ReleasesWhat do the Vault 7 releases mean for you? (And what do they NOT mean.) |
|
Threat Intelligence Alert and Briefing Cadence Schedule TemplateFormalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders. |
|
Integrate Threat Intelligence Into Your Security OperationsOrganizations are struggling to get ahead of threats as they continue to respond reactively rather than proactively. Don’t be left behind. Develop a manageable and... |
|
Integrate Threat Intelligence Into Your Security Operations – Executive BriefRead our concise Executive Brief to find out why you should implement a threat intelligence program, review Info-Tech’s methodology, and understand the four ways we can... |
|
Integrate Threat Intelligence Into Your Security Operations – Phases 1-4Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence ProgramAssess your organization's unique threat landscape, current capabilities, and define an ideal target state. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|