InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Operationalizing Threat Intelligence, Part I: Continuous Monitoring & Threat Detection

Presented by

Leo Sojref, Solutions Architect for External Risk Management at Check Point

About this talk

Cyber threat intelligence has become a standard component of the modern Security Operations Center, but many organizations are under-utilizing the CTI they already have access to. Fully operationalizing threat intelligence doesn't just maximize the value of CTI investments - it also helps to detect threats earlier in the kill chain and keeps the enterprise secure. In this session, Leo Sojref, Solution Architect for External Risk Management at Check Point, will discuss how SOC Managers and other Security Operations leaders can enhance monitoring and detection capabilities with CTI. This will include examples of specific use cases and workflows that increase efficiency, reduce false positives, identify threats faster, and help reduce cyber risk. Join us at 10am EST / 4pm CET on Wed, June 18th for this 1st session in a three-part series on Operationalizing Threat Intelligence. Part II: Incident Response & Threat Hunting is scheduled for Wed, July 16th. Register here: https://www.brighttalk.com/webcast/20101/641934 Part III: Threat Modeling & Security Preparedness is scheduled for Wed, Aug 13th. Register here: https://www.brighttalk.com/webcast/20101/641940
Cyberint, now a Check Point Company

Cyberint, now a Check Point Company

13550 subscribers41 talks
Impactful intelligence to help you detect & defeat cyber risks faster
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Related topics