Skip to content
Banking & Financial Services

Turning Intelligence Into Action


Course
Upgrade subscription below

Holger Spohn of Candriam covers prioritizing tactical versus strategic intelligence to prevent SOC analyst fatigue, feeding IOCs into SIEM systems and using threat intelligence for brand protection, merger due diligence, and threat hunting.

Most organizations collect threat intelligence but struggle to apply it before attacks materialize. The intelligence cycle demands continuous collection, analysis and distribution - yet teams drown in millions of alerts without understanding which threats actually target their environment. Blocking IPs remains trivial while identifying adversary tactics requires expertise most teams lack.

Effective threat intelligence requires scaling analysis to match response times; strategic reports can age while operational intelligence expires within seconds.

In this session, Candriam's Holger Spohn will cover:

  • Prioritizing tactical versus strategic intelligence to prevent SOC analyst fatigue and information overload;
  • Feeding IOCs into SIEM systems, patch prioritization workflows and executive risk briefings based on audience needs;
  • Using threat intelligence for brand protection, merger due diligence and threat hunting instead of reactive anomaly detection.
 

 

Here is the course outline:

Turning Intelligence Into Action: Staying Ahead in a Fast-Moving Threat Landscape

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button