We discuss the growing role of Threat Intelligence feeds, reports and information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, daily. We discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses; the role for internal and external resource in managing this intelligence in the wider context of improving cybersecurity posture; and what the future cybersecurity provision may look like.
Internal, external or hybrid?
1. What are your thoughts on utilising/sourcing multiple threat intelligence sources and how do you determine ‘completeness’ of intelligence coverage? Whether geographical, political, industry segmentation or otherwise?
2. How do you integrate traditional endpoint protection; EDR/XDR; internal and external threat intelligence feeds and reports to enhance your cybersecurity posture right now?
3. What do you feel is the evolution of threat intelligence information and how can services from vendors, such as ESET, help meet those future needs?