Events > Event Details


Cyber-Intelligence Empowering IT Security Audit

Threat Intelligence can be used to enrich the process of Security Assessment, proving the enforcement of security controls required for security and compliance. As threat intelligence technology evolves, it’s become instrumental to security IT audit, providing valuable context to the process. During this session we will explore examples based on real world data where contextual threat intelligence is applied to data security requirements and popular risk frameworks to enrich the IT Audit process.

Key Information