Security

Find out this week: How to build a cyber threat intelligence program while cutting through the noise

Tune in online to get a handle on separating good data from clutter


Webcast The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year.

But when putting together a decent cyber-threat intelligence (CTI) program, it’s of paramount importance in 2020 to make sure the right data is involved, and that the data is used in the appropriate places to populate a high quality, functioning intelligence network to correctly chart the presence and progress of threats.

The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need – the people, places, technology, and other moving parts to build the picture.

Essentially, data needs to be turned into actionable, intelligent information – and fast because miscreants aren’t waiting around. That’s where our webcast this week comes in. Tim Phillips of The Register will be joined by Andrew de Lange of threat intelligence experts Anomali. At 1500 BST (0700 PT) on July 29, 2020, they’ll discuss the best way to assemble a CTI program to maximize your protection and make the most of your data.

Tim and Andrew will home in on the general purpose of a CTI – specifically, why truly understanding security threats is absolutely essential for a modern enterprise. They’ll find out how to overcome common challenges, and how to turn data into truly actionable intelligence to suit the complexities of a business in 2020.

They’ll also look into how to create an intelligence-driven security culture at your organisation, and how to keep feeding the CTI machine, making it ever-stronger as every employee does their bit.

Finally, Tim and Andrew will investigate the true nature – and possibilities – of the relationship between the tools and the people within a fully matured cyber threat intelligence program. What should the full package look like, for instance? You’ll come away from this webcast with a fair idea of where to start, and where a CTI for the ages should take you when completed.

Sign up right here for the webcast, brought to you by Anomali.

Send us news

Governments issue alerts after 'sophisticated' state-backed actor found exploiting flaws in Cisco security boxes

Don't get too comfortable: 'Line Dancer' malware may be targeting other vendors, too

With Run:ai acquisition, Nvidia aims to manage your AI kubes

Now Jensen has a control plane to play with his army of NIMs

Apple releases OpenELM, a slightly more accurate LLM

It's not the fastest machine learning model, but you can't have everything

Musk moves Tesla's goalposts, investors happily move shares higher

It's the millions-of-robotaxis promise again – and all y'all buying it this time, too?

Shouldn't Teams, Zoom, Slack all interoperate securely for the Feds? Wyden is asking

Doctorow: 'The most amazing part is that this isn't already the way it's done'

Now all Windows 11 users are getting adverts to 'make the Start menu great again'

And you thought the Bing begging was annoying

Lenovo and Micron first to implement LPCAMM2 in laptop

The SODIMM replacement finally arrives

Microsoft cannot keep its own security in order, so what hope for its add-ons customers?

Secure-by-default... if your pockets are deep enough

US Chamber of Commerce to sue FTC for banning noncompetes in most jobs

Senior execs making $150K+ will still have to abide by them, but they fall away for everyone else

Another Boeing whistleblower comes forward – with receipts

What's that? Q1 was better than expected? Pump those shares

Management company settles for $18.4M after nuclear weapons plant staff fudged their timesheets

The firm 'fessed up to staff misconduct and avoided criminal liability

Google cools on cookie phase-out while regulators chew on plans

Privacy Sandbox slips into 2025 after challenges from UK authorities