Menu
Home
Publishers
Categories
Trending
Inbox
Create Account
Sign in
Nederlands
Deutsch
Use Threat Intelligence to Mitigate Third Party Risk | June 29
Informationweek.com
Subscribe
0
Click here to subscribe to Informationweek.com
Categories:
Services | Professionals
Business goods
Financially
Kantoor
Marketing
Retail
Retail
Industry
Machines
Age:
14 until 18 year
19 until 30 year
31 until 64 years
Loading...
1 year ago
Html
Text
mlns='http://www.w3.org/1999/xhtml'>
Pinpoint data streams most valuable for threat intelligence gathering
How to Use Threat Intelligence to Mitigate Third Party Risk
Thursday, June 29, 2023
| 10AM PT / 1PM ET
REGISTER NOW
John
, Threat intelligence provides security teams with insights into the kinds of attacks that may target their organizations and prioritize their security activities. But what if the risk is coming from third-party partners and systems?
In this webinar, experts discuss how security teams can use available threat intelligence to identify third-party risk and work with partners to mitigate them. Learn how to decide what to collect and how to correlate the information with internal data sources and those belonging to partners and suppliers to get the proper view of the threats
During this webinar you will:
Pinpoint data streams most valuable for threat intelligence gathering.
Identify data that can help identify potential third-party exposure.
Get professional tips on how to work with suppliers to mitigate cybersecurity risk.
REGISTER NOW
Can’t attend the webinar?
Register
anyway and we’ll let you know when it is available
on-demand
.
Webinar sponsored by:
Privacy Policy
FEATURED SPEAKERS
Christopher Crowley
Independent Consult
Lionfish Tech Advisors
Greg Kapourellos
Manager, Intelligence Services
Mandiant
Becky Bracken
Editor
Dark Reading
Having trouble viewing this email?
View Web Version
Dark Reading
c/o Informa Tech
Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
This email was sent to newsletter@newslettercollector.com.
Received this email as a forward?
Sign up
to receive our
newsletter
.
To understand how we use your personal information, please see our
Privacy Policy
|
Unsubscribe
Copyright © 2023 Informa Tech Holdings LLC. All Rights Reserved.
Share on
Loading...
Other newsletters from
Informationweek.com
Ransomware Attack on Blue Yonder Hits Starbucks, Supermarkets | Fancy Bear's Nearest Neighbor Uses Nearby Wi-Fi Network
Informationweek.com
20 hours ago
How to Create an Accurate IT Project Timeline
Informationweek.com
23 hours ago
'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor
Informationweek.com
Yesterday at 14:02
More newsletters from Informationweek.com
Loading...
Related newsletters
[[subject]]
[[publisher.name]]
[[date]]
View other categories
Services | Professionals
Business goods
Financially
Kantoor
Marketing
Retail
Retail
Industry
Machines
© 2024
Information
Terms and Conditions
Privacy
Close
Home
Publishers
Categories
Trending
Inbox
Create Account
Sign in
© 2024
Information
Terms and Conditions
Privacy
Nederlands
Deutsch