Threat intelligence and active defense are all the rage, but meaningless if you don’t know your threats and how they apply to your environment. This webinar will discuss methods to determine the threat environment, identify visibility gaps, and orient defense to likely risks. Participants will leave with a roadmap for implementing threat-focused defense to their networks.
- Explore how to orient network defense activities to the threat environment
- Identify critical assets and chokepoints based upon network and threats
- Develop an iterative process for threat profiling and network defense strategy
Never miss the latest ICS news and insights from our experts.
Ready to put your insights into action?
Take the next steps and contact our team today.