Live Webinar

When and How to Apply Third-Party Intelligence

October 28, 2020 | 1:00 pm

Today’s unprecedented threat landscape requires organizations to be prepared to defend themselves from the bad guys. It is no longer a matter of ‘if’ than ‘when’ an attacker will come knocking on your door.

Applying the latest threat intelligence is imperative to effectively threat hunt to identify and mitigate a problem before it impacts your organization. Having the ability to leverage third-party threat intelligence is critical to this process.

General Motors Logo

Featuring

John Ayers, Chief Strategy Product Officer, Nuspire
Steven Overko, Solution Architect, SentinelOne
John Ayers
John Ayers
Chief Strategy Product Officer
Nuspire
Steven Overko
Steven Overko
Solution Architect
SentinelOne

About this Webinar

The cybersecurity veterans will share how to gain 360-degree visibility and enrich data to better address your unique security challenges.

This informative discussion will include guidance on how to:

  • Hunt the adversary
  • Detect indicators of compromise (IOCs) quickly
  • Investigate and mitigate effectively

Join John Ayers, Chief Strategy Product Officer, and SentinelOne’s Steven Overko, Solution Architect, for a discussion on how to effectively apply third-party threat intelligence to proactively threat hunt.

Don’t miss this opportunity to learn from seasoned threat hunters to address today’s increasingly sophisticated and active threat landscape. This interactive format allows for questions at the end of the webinar—so please bring yours!

Questions

Contact [email protected]

John Ayers
John Ayers
Chief Strategy Product Officer
Nuspire
Steven Overko
Steven Overko
Solution Architect
SentinelOne