Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Threat Intelligence: Information Security's Problem Child?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.

However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.

In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:

  • Understanding the difference between strategic, operational, tactical and technical threat intelligence
  • Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
  • Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence


Wade Baker

Partner and Co-Founder, Cyentia Institute

Nick Frost

Principal Research Analyst, Information Security Forum

    Michael Hill

    Deputy Editor , Infosecurity Magazine

    Chris Pace

    Technology Advocate, Recorded Future

    Brought to You by