Current many organization security operations are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, cyber defense, and threat analysis. These disparate processes leave organizations vulnerable to the increasing number of malicious events and endless firefighting. Hence, it is prudent to set up a customized threat intelligence program right on the onset.
I have put together some quick tips on how to run a threat intelligence consulting workshop for your threat intelligence journey. PM me if you need any additional information, happy to share and learn from each other.
In part 1, we talked about understanding what is threat intelligence. We also elaborate what is actually threat hunting and why is it important to organisation. In part 2, we elaborate on what are the building blocks, what are the key tools and skills that your threat hunting team require to be effective in your threat hunting journey.
Kenneth Ho is not your typical IT professional. Rather, I am a revenue accelerator, brand evangelist and customer satisfaction specialist
As a strategic, result-oriented, high energy professional. I specialises in driving revenue and profits for companies engaged in high complex services and emerging technologies. I am passionate about creating values both for my employers and my customers.
To keep up-to-date with the industry trends and to share my knowledge , I am a frequent speaker for internal, business partners and industry events. I also contribute blogs and articles both internally and externally.