Threat Intelligence can be used to enrich the process of Security Assessment, proving the enforcement of security controls required for security and compliance. As threat intelligence technology evolves, it’s become instrumental to security IT audit, providing valuable context to the process. During this session we will explore examples based on real world data where contextual threat intelligence is applied to data security requirements and popular risk frameworks to enrich the IT Audit process.
Gain access to actionable intelligence, a trusted peer-to-peer network and resources proven to build resilience, plus complimentary entry to FS-ISAC member events and exercise discounts.