Star 0

Abstract

Individuals are encouraged to share lessons they’ve learned from their experiences of using threat intelligence in a security operations environment. How they leveraged the TI; how they got value from TI; what pros and cons they would recommend.

Attendance is strictly limited to allow for a small group experience.