Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on for readers like you. LEARN MORE
How to Use Threat Intelligence to Mitigate Third Party Risk

Register for Your Free On-Demand Webinar Now:

"How to Use Threat Intelligence to Mitigate Third Party Risk"

| Available On-Demand |

Threat intelligence provides security teams with insights into the kinds of attacks that may target their organizations and prioritize their security activities. But what if the risk is coming from third-party partners and systems? In this webinar, experts discuss how security teams can use available threat intelligence to identify third-party risk and work with partners to mitigate them. Learn how to decide what to collect and how to correlate the information with internal data sources and those belonging to partners and suppliers to get the proper view of the threats. Walk away with practical tips on how to use threat intelligence to work with suppliers as part of an overall security strategy.

During this webinar you will:

  • Pinpoint data streams most valuable for threat intelligence gathering.
  • Identify data that can help identify potential third-party exposure.
  • Get professional tips on how to work with suppliers to mitigate cybersecurity risk.

Presented by featured speakers Christopher Crowley & Greg Kapourellos. Moderated by Becky Bracken.

Offered Free by: Mandiant
See All Resources from: Mandiant

Recommended for Professionals Like You: