Abstract
How to source and gather Threat Intelligence and Integrate Threat intelligence into Enterprise Security Controls. Maximizing SIEM and Security Controls to minimize the attack surface.
Bio
Scott Sattler has been involved in information security for over two decades working with defense and Fortune 100 clients globally. Currently working full time for a Fortune 15 and running two security companies.