{"id":6607,"date":"2021-10-21T03:16:35","date_gmt":"2021-10-21T03:16:35","guid":{"rendered":"https:\/\/www.cyfirma.com\/?post_type=videos&#038;p=6607"},"modified":"2022-02-17T07:02:17","modified_gmt":"2022-02-17T07:02:17","slug":"lets-get-real-cyber-intelligence-use-cases","status":"publish","type":"videos","link":"https:\/\/www.cyfirma.com\/jp\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/","title":{"rendered":"Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases"},"content":{"rendered":"<p>Cyber intelligence can mean different things to different organizations. For some, it can be just a simple data feed that goes into a SIEM platform, whilst for others, it can be the most powerful asset in their cyber defense arsenal. Quality cyber intelligence that gives deep insights into the external threat landscape has the capability to predict impending cyberattacks. This webinar discusses the importance of effective cyber-intelligence and presents nine use cases for modern cyber defenders. The speaker also illustrates the use cases using an actual (and active at the point of writing) phishing campaign to bring the use cases to life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber intelligence can mean different things to different organizations. For some, it can be just","protected":false},"author":3,"featured_media":6608,"comment_status":"closed","ping_status":"closed","template":"","class_list":["post-6607","videos","type-videos","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases - CYFIRMA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases - CYFIRMA\" \/>\n<meta property=\"og:description\" content=\"Cyber intelligence can mean different things to different organizations. For some, it can be just a simple data feed that...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/\" \/>\n<meta property=\"og:site_name\" content=\"CYFIRMA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-17T07:02:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyfirma.com\/media\/2021\/10\/Let-Get-Real.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"366\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases - CYFIRMA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/","og_locale":"en_US","og_type":"article","og_title":"Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases - CYFIRMA","og_description":"Cyber intelligence can mean different things to different organizations. For some, it can be just a simple data feed that...","og_url":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/","og_site_name":"CYFIRMA","article_modified_time":"2022-02-17T07:02:17+00:00","og_image":[{"width":662,"height":366,"url":"https:\/\/www.cyfirma.com\/media\/2021\/10\/Let-Get-Real.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/","url":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/","name":"Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases - CYFIRMA","isPartOf":{"@id":"https:\/\/www.cyfirma.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/#primaryimage"},"image":{"@id":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyfirma.com\/media\/2021\/10\/Let-Get-Real.jpg","datePublished":"2021-10-21T03:16:35+00:00","dateModified":"2022-02-17T07:02:17+00:00","breadcrumb":{"@id":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/#breadcrumb"},"inLanguage":"jp","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/"]}]},{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/#primaryimage","url":"https:\/\/www.cyfirma.com\/media\/2021\/10\/Let-Get-Real.jpg","contentUrl":"https:\/\/www.cyfirma.com\/media\/2021\/10\/Let-Get-Real.jpg","width":662,"height":366},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyfirma.com\/videoslists\/lets-get-real-cyber-intelligence-use-cases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyfirma.com\/jp\/"},{"@type":"ListItem","position":2,"name":"Videos","item":"https:\/\/www.cyfirma.com\/videoslists\/"},{"@type":"ListItem","position":3,"name":"Let\u2019s Get Real \u2013 Cyber-Intelligence Use Cases"}]},{"@type":"WebSite","@id":"https:\/\/www.cyfirma.com\/#website","url":"https:\/\/www.cyfirma.com\/","name":"CYFIRMA","description":"A threat discovery and cyber-intelligence platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyfirma.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"jp"}]}},"_links":{"self":[{"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/videos\/6607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/videos"}],"about":[{"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/types\/videos"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/comments?post=6607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/media\/6608"}],"wp:attachment":[{"href":"https:\/\/www.cyfirma.com\/jp\/wp-json\/wp\/v2\/media?parent=6607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}