This webinar will walk through the top five critical things to know on how to access and leverage RH-ISAC shared intelligence. With a large percentage of members currently onboarded onto the RH-ISAC Threat Intelligence Sharing Platform, powered by TruSTAR, now is the time to understand how to access and use RH-ISAC shared intelligence to augment and strengthen your ability to defend against new attacks.
- How TruSTAR and RH-ISAC teamed up to provide this intelligence
- What other intelligence sources are accessible in the platform
- How to access and contribute to the RH-ISAC shared Enclave
- How example members are sharing and using RH-ISAC intel to enrich their investigations
- Muktar Kelati, Director, Intel Operations, RH-ISAC
- Kevin Libby, Lead Intel Architect, TruSTAR
ELIGIBILITY: This webinar is open to RH-ISAC Core Members only. Ineligible registrants will have their registration canceled. To learn about eligibility, visit rhisac.org/membership. Email email@example.com with any questions.