
It's BAAAACK! The Return of “We Could Have Stopped That Breach”
CISO Series Podcast
00:00
Threat Intelligence and Effective Defense Strategies
This chapter explores the importance of threat intelligence in guiding resource allocation for security and emphasizes collaboration with vendors. It discusses how companies handled the log 4j incident and highlights the concept of threat-informed defense, focusing on understanding adversaries' tactics and techniques.
Transcript
Play full episode