- Moving from reactive to proactive security - where to begin a threat intelligence gathering function
- Can security teams make use of the dark web and other non-traditional threat intelligence?
- Prioritising your defence efforts – where to deploy your budget and resource