Cyber Threat Intelligence - Top Gun Style

2020-04-15 14:00 - 2020-04-16 10:00

If you just focus on indicators, you're not doing Threat Intelligence.

The general perception of Cyber Threat Intelligence (CTI) is threat data. While data is the foundation of CTI, sometimes so-called threat intelligence is nothing more than an untargeted stream of data, often deployed as yet another dashboard “feature” that overloaded Security Operation Center (SOC) employees are required to monitor.

IT security teams spend hours upon hours, and even days upon days, sifting and sorting through raw data, blocking IPs at the firewall and generally worrying about something that could never become an actual threat to the organization. Meanwhile, the overworked analysts are still blind to critical threats that might be targeting them at that very moment.

Modern approaches see CTI as much more than data, but a holistic process to enable companies to make CTI their own.

In this webinar we will discuss:

  • What the difference between threat data and threat intelligence is
  • How to setup a CTI program following the OODA loop by:
    • Observe: gathering information from various internal and external data sources
    • Orient: contextualization and prioritization of data
    • Decide: provide internal sensor grid with intel on imminent threats
    • Act: capture feedback from sensor grid

Please Register here


Wednesday 15th of April at 2pm CET
Thrusday 16th of APril at 10am CET


Markus Auer
Regional Sales Manager, Central Europe

Falk Schwendike
Threat Intelligence Engineer, Central Europe


Alle Daten

  • Von 2020-04-15 14:00 bis 2020-04-16 10:00
ectacom HQ München

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn

ectacom Wien

ectacom GmbH
Am Europlatz 2
A-1120 Wien

ectacom Poland

ectacom GmbH - Branch in Warsaw
+48 501 295 580
Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!