Skip to content ↓ | Skip to navigation ↓

Although the practice of threat intelligence for many industries is still emerging, the ability to consume and analyze the information relevant to an organization’s industry, environment and brand can prove highly beneficial for any security portfolio.

However, understanding how to consume, analyze and “weed through the noise” of all this data can easily overwhelm IT departments. Additionally, it’s important to remember that the deployment of advanced tools shouldn’t take away from security fundamentals.

In this webinar, Jim O’Conner, CISO at Cargill, explains the two views of threat intelligence and how the critical security controls can fit your business needs while strengthening your organization’s defenses.

Topics covered include:

  • Understanding your network’s environment,
  • Establishing baselines appropriate to your organization,
  • Focusing on the outbound and inbound traffic,
  • And extracting the anomalies

O’Conner is responsible for enterprise-wide risk and control strategy, privacy, policies, metrics, change management, identity, cybersecurity and operations related to information technology security at Cargill.



picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the ShellShock and Heartbleed vulnerability.

picThe Executive’s Guide to the Top 20 Critical Security Controls Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Image courtesy of ShutterStock.