Abstract network background showing interconnected lines and dots in shades of blue, creating a digital mesh-like pattern that represents a concept of connectivity or a data network.

How to Build a Robust Cyber Threat Intelligence Program

According to the 2020 SANS Cyber Threat Intelligence (CTI) Report, respondents identified two key inhibitors to successfully implementing CTI: lack of trained staff or lack of skills needed to fully utilize CTI, and lack of time to implement new processes. One way organizations and teams are bridging this gap is by developing CTI programs that include the three pillars of cybersecurity: people, process, and technology.

To this end, industry experts including SANS Instructor, Katie Nickels, and the VP of Product at DomainTools, Jackie Abrams, will illustrate how to develop a CTI program that will make your team more efficient, effective, and aligned.

In this webinar you will learn how to:

  • Develop CTI requirements and form teams with complementary skill sets
  • Build critical processes based on your requirements
  • Map processes to core outcomes to demonstrate the value of CTI
  • On-board tools to accelerate your program’s effectiveness