Advanced Persistent Intelligence: How Only Relevant Knowledge will Enable Proactive Defense

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In an age where threats are increasingly orchestrated to target specific organizations, industries and technologies, this places much greater emphasis on being able to understand the mind and methods of an attacker.

Gathering and applying relevant intelligence has never been more important, but with so much threat data and so little context available, how is it possible to be confident that you will know and understand the risks that you face, and can proactively defend against them? In this webinar we’ll explain what you can learn by gathering data from varied sources to uncover threat intelligence that’s truly relevant to you. 

Key Takeaways:

  • What combination of factors can result in relevant intelligence?
  • Get examples of how threats target particular industries or technologies
  • How can intelligence be applied for proactive defence?
  • How to get the best actionable data from your logs


Photo of Chris Pace

Chris Pace

Technology Advocate, Recorded Future

Photo of Graeme Park

Graeme Park

Senior Consultant at Mason Advisory

Photo of Brian Shorten

Brian Shorten

Chairman, Charities Security Forum

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Recorded Future here: Please see Infosecurity Magazine’s privacy policy for more information.