Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Fighting Cyber-Attacks Through Security Intelligence

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Security teams are bombarded with information that could indicate a potential threat to the organization – but identifying the real dangers within the sea of digital noise is a constant challenge.

The ability to reduce noise and attain true visibility into actual threats facing your organization is often referred to as ‘security intelligence’. By achieving security intelligence, teams can reduce the time taken to detect and respond to cyber-attacks and properly assess risk.
Leveraging your security intelligence is a complex but incredibly valuable process. It’s worthwhile though – proper insight into the data traversing your network could be the difference between stopping a breach and falling victim to the next headline-grabbing attack.

In this webinar, a panel of experts will discuss what ‘security intelligence’ really means, and how security teams can apply it. Join the debate by asking your questions of the panel, as they explore:

  • How to achieve visibility and deliverable intelligence into malicious network activity
  • Applying contextual information to enhance the quality of security intelligence
  • Achieving automation and efficiency
  • The response lifecycle


Laurance Dine

Managing Principal, Investigative Response, Verizon RISK Team

    Andrew Hollister

    Technical Director, LogRhythm

      Eli Jellenc

      Director, Threat Intelligence, Stroz Friedberg

        Dr. Gerhard Knecht

        Global Head of Information Security Services, Unisys

          Stephen Pritchard

          Moderator, Infosecurity Magazine

            Brought to You by