Know Your Enemy: Proactive Cyber Threat Intelligence and Threat Hunting
Join battle-tested threat hunter Sid Pearl to learn how to use cyber threat intelligence to proactively hunt advanced threats that evade detection. Discover how military intelligence analysis methodologies are now being adopted by the SOC to defeat advanced adversaries in cyberspace.
In this webinar, you will learn:
- How to define the threat landscape
- How to define your adversary
- How to conduct proactive cyber threat intelligence analysis against your adversary
Sid Pearl is an IBM i2 Safer Planet subject matter expert, as well CISO for the International Association of Certified Information Sharing and Analysis Organizations (ISAOs), protecting U.S. national security and critical infrastructure interests. Previously, he served as a global cyber security and cyber intelligence executive at Unisys, where he led business and practice development for Unisys’ eight security operations centers (SOCs), as well as the unified risk and intelligence/analytics practice. Sid served 20 years with the U.S. Navy in Special Operations, including combat communications and intelligence operations for joint special forces.
WW i2 / Safer Planet Cyber SME