Webinar by

Tuesday, February 8th at 11:30 am PT / 2:30 pm ET

The divide between threat intelligence and SecOps creates a significant gap in how well organizations can really defend themselves from targeted attacks. Yet, many organizations struggle to identify how or where to begin with using intelligence to drive core cyber decisions and action.

A groundswell movement within sharing communities has become essential to improve the accuracy and speed of threat response, so teams of any size can build toward an intelligence-driven security organization – and align with their program maturity. This requires a shift in thinking to where intelligence is considered THE fundamental component of cyber programs, as well as an acknowledgement of needing to find a place to start.

This presentation will cover how teams will articulate a clear strategy built on threat intelligence maturity that’s designed up-level how they’re using intelligence. Experts will also articulate some easy-to-follow use cases to demonstrate how an optimized model can be applied across the varying maturity levels, and will feature a practitioner-led case study.


Attendees will learn:


  • – How to understand the value of the data they’re exposed to
  • – Ways that a cybersecurity team can articulate that value to their leadership team (to join an ISAC and / or acquire technology in-house)
  • – A step-by-step approach to consuming threat intelligence through a “high consumption, low consumption” model
  • – How to curate and subsequently correlate the right threat intelligence based on relevancy
  • – Share the intelligence and insights in an efficient way to funnel into action


Register now at



If you have any questions, please email us at contact@h-isac.org



Times listed below are EST

  • 02/08/2022
    2:30 pm - 3:30 pm
Translate »