<h2>Learn About Emerging Threats and Innovative Threat Intelligence Strategies</h2>
<p>This virtual threat briefing brought everyone together to discuss threat intelligence challenges, requirements, and best practices. Industry experts and threat intelligence thought-leaders provided briefings on today’s threat landscape, adversaries, and their attack techniques.</p>
<p>Watch all 3 sessions on-demand and walk away with recommendations for your teams and tangible information to research within your own environments.</p>
<p><strong>Building Effective Cyber Threat Intelligence Programs</strong><br />
AJ Nash, Senior Director of Cyber Intelligence Strategy, Anomali</p>
<p><strong>Practical Use Cases for Compromised Credential Monitoring</strong><br />
Scott Renna, Solutions Architect, Flashpoint</p>
<p><strong>Analysis of an Attack Surface: 5 Ways Threat Actors Target the Digital Enterprise</strong><br />
Josh Mayfield, Product Marketing, RiskIQ</p>
<h3>Sponsors</h3>
<div class="anomali-scroller">
<ul class="list-inline pb-3">
<li class="list-inline-item mt-3"><img alt="Anomali" class="xlarge anomali-scroller-image" src="{assets_3983:https://www.anomali.com/images/uploads/landing/anomali-white.png}" /></li>
<li class="list-inline-item mt-3"><img alt="Flashpoint" class="xlarge anomali-scroller-image" src="{assets_3984:https://www.anomali.com/images/uploads/landing/flashpoint-white.png}" /></li>
<li class="list-inline-item mt-3"><img alt="RiskIQ" class="xlarge anomali-scroller-image" src="{assets_3985:https://www.anomali.com/images/uploads/landing/riskiq-white.png}" /></li>
</ul>
</div>