No Results Match Your Search
Please try again or contact marketing@threatconnect.com for more information on our resources.
How to Get Promoted: Developing Metrics to Show How Threat Intel Works
Many organizations have operationalized threat intelligence as part of a well-rounded security program, but often struggle to show the return on investment. This webinar focuses on developing measures of effectiveness whether your program is just getting started or is pretty well established, independent of what tools or vendors you use.
Disrupting Adversary Infrastructure
Using the State of New York as an example, this white paper describes how ThreatConnect’s tactics are intended to encourage ISP and government collaboration with a sharp focus on disrupting adversary infrastructure.
Security Operations Maturity Model
ThreatConnect developed a Security Operations Maturity Model to provide a systematic guide to help you understand where your organization resides on the path to fully leveraging the power of a SOAR Platform.
ThreatConnect Intelligence Cycle
The Intelligence Cycle is a 6-step methodology adapted by many organizations. In this infographic, see how each stage aligns with the ThreatConnect Platform. Download Print Ready Version
Customer Success Story: Packaged Goods Leader Takes Automated Cyber Risk Quantification Global
Find out how ThreatConnect’s Risk Quantifier solution: Helped a customer cut out the long, laborious, and manual effort of gathering and tabulating data in Excel spreadsheets and using business intelligence to produce results they could count on. Delivered results for more than 250 applications and 30 separate legal entities in less than 90 days. Established […]
A ThreatConnect Customer Success Story: Establishing a Strong Partnership to Ensure Continued Success
Find out how ThreatConnect: Helped a customer set up and deploy the ThreatConnect TI Ops Platform. Delivered tailored training, ensuring that the customer’s security team felt confident in their ability to use the Platform. Established multiple avenues for ongoing communication with the ThreatConnect Customer Success and Support Teams. Learn more about ThreatConnect’s TI Ops platform […]
Reduce Risk and Improve Security through Infrastructure Automation
Watch this webinar to hear Joe Reese, Product Manager at ThreatConnect and guest speaker Joseph (JB) Blankenship, Principal Analyst at Forrester discuss the effect security automation is having on infrastructure and security processes. They talk about how automation can reduce security “grunt work” and increase the speed and reliability of incident response procedures. Download the […]
Overview of Using the MITRE ATT&CK Framework in ThreatConnect
Join our Director of Research, Alex Valdivia, as he walks through how to take advantage of the MITRE ATT&CK Framework within ThreatConnect. This video provides a high level introduction. If more details are necessary, please reach out to our sales team or your dedicated customer success team for additional information.
A ThreatConnect Customer Success Story: Creating an Efficient Reporting Workflow To and From the Security Operations Center
Find out how ThreatConnect helped a customer: Establish a streamlined communication process between the SOC and individual groups throughout the organization Improved the quality and amount of historical data being housed for future queries
Common & Best Practices for Security Operations Centers: Results of the 2019 SOC Survey
SANS recently surveyed their members in hopes to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. The most frequently cited barriers to excellence were lack of skilled staff (58%) followed by absence of effective orchestration and automation (50%). Download the paper to see […]
A ThreatConnect Success Story: Automating the Process of Blocking Malicious Indicators with Playbooks
Find out how ThreatConnect helped a customer: Quickly build Playbooks and create proper workflow Speed up the process from identifying malicious indicators and getting block controls put in place for them
A ThreatConnect Success Story: Identifying Additional Insights on Cyber Adversaries
Find out how ThreatConnect helped a customer: Validate their own findings regarding the adversaries they were tracking. Identify any known intelligence and operations gaps in analysis that pose a risk to themselves and their environment.