Star 0

Abstract

Using commercial and open-source threat intelligence tools, this talk will demonstrate how to get additional intelligence from your current security infrastructure in order to detect historic and real-time indicators of compromise. Adding valuable time context to threat intelligence allows you to pinpoint when a breach occurred as well as gain critical forensic analysis information.