Illustrate what cyber threat intelligence is, accompanied by an introduction to multiple use case examples that are relevant to the UKI market, where CTI was used to help provide gap analysis and prioritization in the face of a data breach.
Intelligence research examples from the region will be used to describe how the challenge was solved and the steps that can be taken (best practices) to uncover a business’s risk and liability in the face of a security threat.
Key Learning Objectives
- Understand of how threat actor strategies shifted from looking for a gap in your perimeter or users, to studying you from the outside in order to map and exploit your network of trusted relationships
- Go through specific examples of modern cyberattacks and techniques leaving you with a better understanding of their impact and severity
- The value of building a framework to position your defenses for threats both inside your network and outside of your perimeter