Big Data , Data Breach Prevention and Response Summit , Events

Cyber Threat Intelligence
Cyber Threat Intelligence

Collecting security and fraud related data from multiple sources can often just result in creating a very large pool of unrelated facts. But, begin to add context to that data and you now have information. Triangulate multiple pieces of information together and you can create intelligence.

See Also: 12 Top Cloud Threats of 2016

This session will answer questions such as:

  • How can I create actionable intelligence from data feeds?
  • How will emerging threat information exchange specifications such as TAXII/STIX effect our ability to collect and share standardized threat information with the broader community?
  • How do I best select and combine internal context and event information with the various open source and commercial external threat intelligence feeds available?


Around the Network