Next-Generation Technologies & Secure Development , Threat Hunting , Threat Intelligence

Taking Complexity Out of Threat Intelligence

Neal Dennis of Cyware on Operationalizing Threat Intel in Midmarket Enterprises
Neal Dennis, Threat Intel Specialist, Cyware Labs

Large enterprises generally have a good grasp on gathering and operationalizing threat intelligence. But when it comes to the midmarket, there are unique challenges. Neal Dennis of Cyware Labs tells how to overcome these obstacles and achieve value from a threat intel platform.

In this video interview with ISMG, Dennis discusses:

  • Threat intel challenges for midmarket enterprises;
  • The value of a threat intel platform;
  • How to best operationalize the intel.

Dennis has worked in cyber intelligence for over 19 years in various roles. He has worked with customer success, helped clients map out new intelligence workflows and built out several intelligence analysis programs for Fortune 500 companies. He started his career as a SIGINT specialist while serving in the United States Marine Corps and later supported cyber initiatives for USCYBERCOM, STRATCOM, the NSA, the 24th Air Force, the USAF Office of Special Investigations and JFCC-NW.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.