Series: i2/Threat Hunting Webinar Library

Looking to learn from experts across industries about everything related to the new and evolving space of i2 and cyberthreat hunting?

The i2 webinars cover a variety of topics, including cyberthreat intelligence overviews, industries that have leveraged this intelligence to best practice, experts who have hunted the bad guys across both physical and cyberspace using i2 investigation tools, and more.

Whether you are interested in learning about new cyber trends, are looking to sharpen your knowledge or want to discover the latest IBM i2 features straight from our product experts – take advantage of this easy, living library for all your on-demand learning needs. We are excited to share it with you!

Share this:

Webinar: IBM i2 User Group Webinar: Advance Your Existing i2 Capabilities

We want to hear from you! The IBM i2 customer base is making the world a safer place daily. Whether you are tracking down terrorist threats, investigating crimes, or in the private sector looking at cyber and financial crimes against your...

Webinar: IBM i2 User Group — Get Ahead of The Threats

We want to hear from you! The IBM i2 customer base is making the world a safer place daily. Whether you are tracking down terrorist threats, investigating crimes, or in the private sector looking at cyber and financial crimes against your...

Webinar: Follow the Money: Fighting Fraud & Financial Crime Q&A

Fraud and financial crime threat actors are getting more sophisticated along with the rising availability of attack tools and exploits. Additionally, analysts are overwhelmed by the volume and velocity of data needed to thwart fraud threats. Join...

Unlocking the Power of Geospatial Intelligence to Find the Bad Guys

The bad guys are skilled at covering their tracks, making it challenging for the good guys to connect the dots. Additionally, the good guys struggle to uncover critical insights buried in mountains of disparate data. Learn how to get more out of...

Know Your Enemy: Proactive Cyber Threat Intelligence and Threat Hunting

Join battle-tested threat hunter Sid Pearl to learn how to use cyber threat intelligence to proactively hunt advanced threats that evade detection. Discover how military intelligence analysis methodologies are now being adopted by the SOC to defeat...
Share this: