Competency
This competency equips participants with the essential knowledge and skills to effectively utilize threat intelligence in enhancing organizational security. Covering everything from fundamentals and data collection to implementation and compliance with ISO/IEC 27001, this program fosters a proactive approach to risk management and continuous improvement. Participants will emerge ready to integrate threat intelligence into their security operations seamlessly.
5 Trainers
About
This competency offers participants a deep dive into threat intelligence, teaching the processes of data collection, analysis, and integration with security operations. Participants will learn how to leverage threat intelligence for preventive and detective security measures and develop strategies for continuous improvement. Additionally, the course includes practical guidance on aligning threat intelligence with ISO/IEC 27001 compliance standards.
This course is perfect for:
Module 1
Module 2
Module 3
Module 4
Implementation of Control A 5.7
Threat Intelligence
ISO/IEC 27001
Risk Management
Information Security Controls
Cybersecurity
Information Technology Audit and Cyber Risk Consultant
Grace Pfohl holds both a Bachelor’s and Master’s of Science in Computer Science from Georgia Tech in Atlanta, GA, specializing in Human-Computer Interaction. With a strong foundation in user experience and design principles, she is a member of the Audit and Implementation practice at risk3sixty in Atlanta, where she contributes to enhancing organizational security and compliance through effective auditing and implementation strategies.