Understanding the Cyber Threat Intelligence (CTI) Process
A Presentation from the RMISC Virtual Event, June 8-10, 2021
Imagine you arrive at work to find your organization under attack from a Malicious Cyber Actor (MCA). Unfortunately, your cyber defenders do not have access to information tailored to the organization and the missed the indicators of compromise (IOC) that were right under their noses. In the ‘lessons learned’ discussion, once the bleeding had been stopped, the entire C-Suite gazed in your direction and asked a simple question. “What do you need so this never happens again?”
Sound familiar? If it does, that’s why we’re talking about CTI and why it’s important!
During this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.
If you have any questions regarding this video, or if you would like to understand how your organization could leverage the CTI process, please contact us for more information.
More Information on CTI
zvelo has also posted a three part blog series on the different stages of the CTI process feedback loop. If you would like to read more, those blog posts are listed here.
- Part 1 — Cyber Threat Intelligence: Planning & Direction
- Part 2 — CTI: Collection and Processing
- Part 3 — CTI: Analysis, Dissemination, & Feedback
About RMISC
The Rocky Mountain Information Security Conference (RMISC) from what we know is the only conference of its kind in the Rocky Mountain region. It is an affordable, convenient, knowledge-builder for IT security, compliance and audit professionals at all levels.
The aim of RMISC is to provide the perfect blend of networking, education, and opportunities that are critical to your success in today’s economy and security climate!