Skip to main content

Explore Featured Resources

Showing 287 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Orchestration and Automation

SANSFIRE 2020 – Live Online

In this webinar, experts provide live online cyber security training in the wake of COVID-19.

Security Operations

The SOC is a Machine – And Lessons Learned from Lockdown

In this webinar, experts discuss how the global pandemic forced businesses and the cyber security industry to adapt. Meanwhile, the SOC was forced to maintain security for the company and help provide the employees the ability to maintain business operations.

Orchestration and Automation

The Connection – Using Phishing Emails to Demonstrate ThreatConnect’s SOAR capabilities

In this webinar, experts offer insight about ThreatConnect’s three aspects of SOAR: our TIP capabilities, Playbooks, and Case Management using phishing emails as the main use case for the overview.

Security Operations

Building and Managing the Next-Generation Security Operations Center (SOC)

In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today’s most current threats and online exploits.

ThreatConnect Platform

The ROI of Implementing the ThreatConnect Platform: Total Economic Impact Study Results

ThreatConnect commissioned Forrester to conduct a Total Economic Impact (TEI) study, examining the potential Return on Investment (ROI) organizations might realize by implementing the ThreatConnect Platform. Watch this video as we provide a framework to evaluate the financial impact of the ThreatConnect Platform, covering benefits, costs, risk, and flexibility.

ThreatConnect Platform

Using MITRE ATT&CK and Threat Intelligence to Stop Attacks

The ThreatConnect Platform was specifically designed to help users understand adversaries, automate workflows, and mitigate threats faster using threat intelligence. When integrated with Flashpoint, users can seamlessly access finished intelligence and targeted data from illicit online communities. By mapping these insights to the MITRE ATT&CK framework, users can gain even greater visibility into emerging threats, […]

Security Operations

Shaking Off Security Alert Fatigue: Tips for Taking Control

Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the snooze button on your alarm clock. How can you manage security alerts so they are […]

Threat Intelligence Operations

How to Get Promoted: Developing Metrics to Show How Threat Intel Works

Many organizations have operationalized threat intelligence as part of a well-rounded security program, but often struggle to show the return on investment. This webinar focuses on developing measures of effectiveness whether your program is just getting started or is pretty well established, independent of what tools or vendors you use.

Disrupting Adversary Infrastructure
ThreatConnect Platform

Disrupting Adversary Infrastructure

Using the State of New York as an example, this white paper describes how ThreatConnect’s tactics are intended to encourage ISP and government collaboration with a sharp focus on disrupting adversary infrastructure.

Security Operations Maturity Model
Security Operations

Security Operations Maturity Model

ThreatConnect developed a Security Operations Maturity Model to provide a systematic guide to help you understand where your organization resides on the path to fully leveraging the power of a SOAR Platform.

ThreatConnect Intelligence Cycle
Threat Intelligence Operations

ThreatConnect Intelligence Cycle

The Intelligence Cycle is a 6-step methodology adapted by many organizations. In this infographic, see how each stage aligns with the ThreatConnect Platform. Download Print Ready Version

Customer Success Story: Packaged Goods Leader Takes Automated Cyber Risk Quantification Global
Cyber Risk Quantification

Customer Success Story: Packaged Goods Leader Takes Automated Cyber Risk Quantification Global

Find out how ThreatConnect’s Risk Quantifier solution: Helped a customer cut out the long, laborious, and manual effort of gathering and tabulating data in Excel spreadsheets and using business intelligence to produce results they could count on. Delivered results for more than 250 applications and 30 separate legal entities in less than 90 days. Established […]