The Art of Using Threat Intelligence to Improve Your Security Operations
Why is it so important to do threat hunting in today’s expanding attack surface
What are the latest tools and methodologies used by threat intelligence teams to automate and accelerate hunting
How to gain visibility of targeted threats in your digital footprint eg. in the Internet, Deep-Web and Dark-Web
How threat actors use leaked and sensitive data to target your organization and personnel
How does an effective CTI strategy transform security operations, improve performance and reduce risk
Case study
Orel Pery
CyberProof
Orel is a senior cyber threat intelligence analyst at CyberProof identifying current and future information security threats and providing situational awareness recommendations for security...
Max is a cyber security expert with over eight years’ experience in the field specializing in network monitoring and offensive security. He is frequently quoted on cyber-related issues on...
Tom is a Senior Program Manager, Microsoft P-CSA (Partner Cloud Solutions Architect) and Microsoft Azure MVP at Microsoft. His more than fifteen-year experience with Microsoft infrastructure...
Orel is a senior cyber threat intelligence analyst at CyberProof identifying current and future information security threats and providing situational awareness recommendations for security...