Endpoint Detection & Response (EDR) , Endpoint Security , Managed Detection & Response (MDR)

How to Grow - and Integrate - Your Threat Intelligence Program

ReliaQuest's Casey Martin on Hallmarks of Maturity - and How to Achieve it
Casey Martin, Director of Threat Management, ReliaQuest

Finding the right balance of high-quality threat intelligence to reduce noise and mitigate the most serious risks – and then integrating this effectively into security programs – is where many organizations struggle. Casey Martin of ReliaQuest shares insight on the keys to maturing threat intelligence programs for improved visibility and high-fidelity detection and response.

In a video interview with ISMG, Martin, Director of Threat Management at ReliaQuest, discusses:

  • Qualities that define threat intelligence maturity;
  • Technical barriers to integrating threat intelligence across the security lifecycle;
  • Key business benefits to an integrated approach – and how to achieve them.

Casey Martin is an information security professional with a curiosity for enabling blue team operations. Casey has operated in all technical aspects of security operations as well as leading the customer enablement effort as the Director of Security Operations for some of the world’s most trusted brands. In his current role, Casey leads the Threat Management function at ReliaQuest, which engages him in innovative functions such as SOC research and development, threat intelligence, and red team operations.

To learn more about how ReliaQuest GreyMatter integrates multi-feed threat intelligence in support of end-to-end visibility and automation across an enterprise's environment, visit www.reliaquest.com.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.