Resources
Access the latest resources including White Papers, Case Studies, Product Descriptions, Analysts Reports, and more, covering the topic of Cyber Threat Intelligence. Experts share their insights for Threat Analysts, Security Analysts, Managers of Threat Intelligence / SOC / CERT, and CISOs.

Ransomware as a Smokescreen for Nation-State Sponsored Espionage Operations English
There is a general consensus around the financial motivation behind ransomware campaigns. While this holds true, in this presentation we are going to look into alternative hypotheses where cyber-criminal gangs cooperate with nation states to target victims in order to steal data of value for the nation state sponsoring the operation, hiding the nation state attribution and the espionage motive behind the cyber-criminal gang attribution and financial motive.
Watch recording
Understanding the Ransomware Landscape English
This talk consists of 3 main parts: a historical overview of the ransomware phenomenon, how Cyber Threat Intelligence driven security can prevent a ransomware attack by providing the strategic, operational and tactical intelligence, and a description of a worst case scenario resulting from a successful ransomware attack against a targeted victim.
Watch recording
CTI-Powered Cyber Security Operations English
EclecticIQ and Kaspersky came together to present a Webinar for Practitioners, by Practitioners. We demonstrated the benefits of a security operation center (SOC) powered by cyber threat intelligence (CTI)—and we’re proving our findings with live demos.
Watch recording
Narrator: Generating Intelligence Reports from Structured Data English
Explore the role of Natural Language Generation (NLG) in the cyber threat intelligence domain.
Watch recording
Preventing Cybercrime with SOC Augmentation English
The Kaspersky and EclecticIQ collaboration on their portfolio of integrations guarantees high-end Cyber Threat Intelligence analysis, empowering organizations to stay ahead of cybercrime. This webinar shows the strength of our combined portfolio and offering, with a product demonstration.
Watch recording
How to Leverage CTI to Defend From Ransomware English
How CTI can be leveraged in practical terms from a tactic and a strategic point of view.
Watch recording
CTI Collaboration Using STIX and Elasticsearch English
In this talk we explore the concepts that underpin true intelligence collaboration and describe a means to achieve it using STIX and elasticsearch.
Watch recording
Lessons Learned Implementing Intelligence-led Security English
We have invited Carol Geyer, Chief Development Officer from OASIS, to discuss how the adoption of STIX and TAXII might transform the CTI practices of organizations. Further, during this webinar we will look at some of the issues that central government and enterprises face, when setting up CTI capabilities.
Watch recording
How to overcome the Threat Intelligence Cycle Paralysis? English
Demonstration on how to overcome threat intelligence paralysis by using a ransomware campaign and botnet threat, by providing context through their relationships with each other and additional threats.
Watch recording