[On-demand] CTI explained – How to elevate cyber threat intelligence in your organization

Watch now

Watch this webinar to uncover the responsibilities of a modern cyber threat intelligence team (CTI), how to elevate the use of threat intelligence in your security team, and the questions you must ask when selecting a cybersecurity partner.

 

The role of threat intelligence has never been more important – or more challenging. As the barrage of sophisticated cyberattacks grows, so too does the need for technology to help you keep pace. In this webinar, Searchlight Cyber’s Director of Threat Intelligence, Jim Simpson banishes the common misconceptions of what a cyber threat intelligence (CTI) team does, outlines its core responsibilities, and shares how you can elevate the use of threat intelligence in your security team – to ensure the intel you gather is meeting your company’s cybersecurity requirements (and delivering a return).

 

Key takeaways:

  • Overview of the modern CTI team has evolved and how it delivers value today
  • How to use dark web data as a source for early warning of emerging threats
  • The questions you must ask when selecting a cybersecurity partner

 

key moments of the webinar:

  • 04:20 – The challenges for modern CTI teams
  • 07:12 – The Venn diagram of an external threat
  • 09:18 – What is the origin of CTI, for enterprise, law enforcement, and intelligence teams?
  • 12:24 – The intelligence lifecycle
  • 14:31 – Intelligence requirements: Satisfying consumer needs
  • 18:07 – How to create intel requirements if you don’t have any
  • 25:11 – Mapping threats to the MITRE ATT&CK Framework
  • 26:42 – What is collection, how does it add value, and how to plan your collection?
  • 29:59 – How does an external collection management framework work?
  • 32:00 – Using first, second, and third-party data collections to meet your requirements
  • 34:07 – Live demo: M&A scenario – risk mitigation for CTI teams using dark web monitoring
  • 46:06 – 8x key takeaways for CTI teams
  • 47:24 – 10 questions you must ask a vendor before buying a CTI solution
  • 48:26 – Q&A

Speakers

Jim Simpson - Searchlight Cyber

Jim Simpson

Director of Threat Intelligence at Searchlight Cyber

Rob Fitzsimons - Searchlight Cyber

Rob Fitzsimons

Senior Threat Intelligence Engineer at Searchlight Cyber

Alex Blackman - Searchlight Cyber

Alex Blackman

Head of Product Marketing at Searchlight Cyber