Operationalize Threat Intelligence: Insights Into Leveraging Cyberthreat Intelligence (CTI) Programs

Featuring

  • Palo Alto Networks
  • Palo Alto Networks Unit 42

About This Webinar

Today, security teams face an overwhelming barrage of complex and evolving threats. Defending against these threats starts with knowing them — this is where cyberthreat intelligence plays a role. However, with millions of indicators daily, security teams struggle to get the most value from their threat intel investments.

Cyberthreat intelligence (CTI) programs can significantly improve an organization’s ability to effectively detect, prevent and respond to security threats as long as you follow best practices. However, several factors must be considered to implement a successful CTI program.

  1. Scott Bekker

    Host Scott Bekker Webinar Moderator ActualTech Media

  2. Kyle Wilhoit

    Featuring Kyle Wilhoit Director, Threat Research, Unit 42 Threat Intelligence Palo Alto Networks

  3. Joshua Costa

    Featuring Joshua Costa Director of Product Marketing Palo Alto Networks

What You'll Learn

  1. The pros and cons of CTI programs.
  2. How to start operationalizing threat intelligence.
  3. How Unit 42 and XSOAR TIM* help maximize efficiency.