I Can Haz Requirements?: Requirements and CTI Program Success - SANS CTI Summit 2018
The Way to a Stakeholder’s Heart is by Providing Value: Measuring Success of Your CTI Program
You Get What You Ask For: Building Intelligent Teams for CTI Success – CTI Summit 2022
Six CTI Challenges and Their Solutions - Reaching CTI's Full Potential
Homemade Ramen & Threat Intelligence: A Recipe for Both - SANS CTI Summit 2018
The Challenge of Adversary Intent and Deriving Value Out of It - SANS CTI Summit 2018
Information Anarchy: A Survival Guide for the Misinformation Age - SANS CTI Summit 2018
How to Get Promoted: Developing Metrics to Show How Threat Intel Works - SANS CTI Summit 2019
Keynote - Journey to the Center of CTI: Story, Systems, and Self
CTI Bake-Off: A Recipe for Measuring, Integrating, and Prioritizing a CTI Program
Knowing When to Consume Intelligence and When to Generate It - CTI SUMMIT 2017
One Piece at a Time: A Guide to Building a CTI Program
ElasticIntel: Building an Open-Source Threat Intel Aggregation Platform - SANS CTI Summit 2018
Developing The Analyst: Creating Career Roadmaps for Intelligently Progressing in CTI
2017 CTI Summit Highlight - Knowing When to Consume Intelligence and When to Generate It
Is Sharing Caring? A Deeply Human Study on CTI Networking
Upgrading Your CTI to Track Down Criminal Hosting Infrastructures - SANS CTI Summit 2018
Using CTI Against the World's Most Successful Email Scam - CTI SUMMIT 2017
Language and Culture in Threat Intelligence - SANS CTI Summit 2019
We’re in Now, Now: The Tyranny of Current Intelligence and How to Manage It