Skip to main content

Implementing Threat Profiling for Network Defense

Threat intelligence and active defense are all the rage, but meaningless if you don’t know your threats and how they apply to your environment. This webinar will discuss methods to determine the threat environment, identify visibility gaps, and orient defense to likely risks. Participants will leave with a roadmap for implementing threat-focused defense to their networks.

Learning Objectives:

  1. Explore how to orient network defense activities to the threat environment
  2. Identify critical assets and chokepoints based upon network and threats
  3. Develop an iterative process for threat profiling and network defense strategy
Discover More Resources Using Keyword Tags
Frontline Perspective

Never miss the latest ICS news and insights from our experts.


View the next webinar


Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats


View Webinar
Right Arrow

View more webinars

Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.