Threat Intelligence – From Haystacks to Needles
Information Security, as a function, sits at a great confluence of raw unfiltered data; perhaps more data about the enterprise than any other function of the organization. From state-based data such as vulnerability scan results, to event-based data such as IDS logs, we are collecting more and more information about the enterprise every passing day.
The next step is to make sense of this treasure trove of data. To find the nuggets of truth and transform them into useful information.
Date: June 17, 2016
Registration: 8:00 a.m.
Time: 9:00 a.m.–5:00 p.m.
Venue: Marriott Denver South
10345 Park Meadows
Littleton, Colorado 80124
Registration Fee: $99
For full program, speaker information, and registration,
Leave a Reply
You must be logged in to post a comment.