Threat Intelligence Webinars

Discover Security Events in Threat Intelligence

Get Threat Intelligence Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Threat Intelligence: Current Status

Threat Intelligence has matured into a critical capability that informs security strategy, enhances detection capabilities, and enables proactive defense by providing actionable information about adversaries, their tactics, and emerging threats. Organizations leverage threat intelligence to understand the threat landscape, prioritize security investments, and make risk-informed decisions based on real-world adversary activity.

Intelligence Sharing and Collaboration

The threat intelligence ecosystem encompasses commercial vendors, open-source feeds, industry sharing groups, and government organizations that collect, analyze, and disseminate information about cyber threats. Information Sharing and Analysis Centers (ISACs) facilitate sector-specific intelligence exchange, while frameworks like STIX (Structured Threat Information Expression) and TAXII (Trusted Automated Exchange of Indicator Information) standardize intelligence formats and sharing mechanisms. However, trust, legal concerns, and competitive considerations sometimes limit sharing effectiveness.

Intelligence-Driven Security Operations

Modern security operations integrate threat intelligence into SIEM platforms, endpoint protection systems, firewalls, and incident response workflows. Strategic intelligence informs leadership about threat actor motivations and campaigns. Tactical intelligence provides indicators of compromise enabling automated blocking and detection. Operational intelligence reveals adversary tactics, techniques, and procedures guiding hunt operations and detection engineering. Organizations are developing dedicated threat intelligence teams that consume, analyze, and operationalize intelligence relevant to their specific risk profile.

Challenges and Evolution

Threat intelligence faces challenges including information overload, indicator quality and relevance, attribution accuracy, and measuring intelligence program effectiveness. Organizations struggle to contextualize generic intelligence feeds for their specific environment. The field is evolving toward predictive intelligence, automated enrichment, and integration with security analytics platforms. Success requires skilled analysts who can translate raw intelligence into actionable security improvements protecting organizational assets.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

10th December 2025 | Scaling Threat Response with OpenAI: Doppel’s Impact on the Modern SOC

This webinar examines how Doppel uses advanced OpenAI models to automate core SOC workflows and accelerate the takedown of social engineering attacks. The session explains how AI driven detection, paired with human oversight, reduces operational load and expands the capacity of security teams. Attendees will see how reinforcement fine tuning supports high reliability in low fault tolerance environments.

The discussion highlights recent performance gains, including major reductions in SOC workload and significant improvements in response speed. Speakers walk through how Doppel refines AI models, how human analysts guide system reliability and how autonomous detection and response can strengthen business impact. The session also outlines the path toward a fully autonomous SOC designed to identify, triage and neutralize threats at internet scale.

Company_Webinar • Part of Doppel

_flag

9th December 2025 | Preparing OSINT for Effective Intelligence Sharing

Practical techniques for preparing OSINT so intelligence reaches the people who need it quickly, safely, and in a decision-ready format. Skopenow’s OSINT expert Steve Adams leads the session and shares hands-on methods to keep sensitive tradecraft protected while accelerating information flow to investigators and analysts.

You will see how to grade source reliability and credibility, apply techniques that shield sensitive details, choose dissemination approaches that match each consumer’s needs, and tailor intelligence formats so decision makers receive only what is relevant. The session delivers clear, practical workflows for effective OSINT sharing across teams and organizations.

Company_Webinar • Part of Skopenow

_flag

29th April 2025 | Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries

The "Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries" event provided insightful analysis on the evolving threat landscape. Experts discussed the tactics of Scattered Spider, emphasizing the vulnerabilities in cloud infrastructures. Attendees gained valuable knowledge on prevention strategies and incident response. The event was well-organized, featuring engaging presentations and interactive Q&A sessions, making it a must-attend for professionals in the insurance and financial sectors seeking to bolster their cybersecurity defenses.

Online • Part of EclecticIQ

_flag

29th April 2025 | Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries

The "Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries" webinar provided valuable insights into the evolving threat landscape. Experts discussed the tactics of the Scattered Spider group, emphasizing their focus on insurance and financial sectors. Attendees appreciated the detailed analysis of recent attacks and the practical strategies for enhancing cloud security. The event was well-received for its timely content and actionable advice, making it a must-attend for cybersecurity professionals.

Online • Part of EclecticIQ

_flag

29th April 2025 | Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries

The "Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries" event provided insightful analysis on the evolving threat landscape. Experts discussed the tactics of Scattered Spider, emphasizing the vulnerabilities in cloud infrastructures. Attendees gained valuable knowledge on prevention strategies and incident response. The event was well-organized, featuring engaging presentations and interactive Q&A sessions. It was particularly beneficial for professionals in the insurance and financial sectors seeking to enhance their cybersecurity posture.

Online • Part of EclecticIQ

_flag