Cyber Beat Live: More Than Threat Hunting — Identify Connections And Visualize Data With IBM i2

Meet IBM i2, the newest addition to the IBM Security portfolio. i2 has roots in both law enforcement and the intelligence community, where it's been used for nearly three decades. Today, these same tools are becoming a critical component of many organizations' cyber defense operations. In this podcast, host Bob Stasio and his expert panel, consisting of Mike McCracken of IBM and Katie Crotty and Dave Williams of Praescient Analytics, trace the evolution of i2. They also share a variety of fascinating cross-industry use cases that reveal how i2 facilitates analysis of large volumes of data and identifies key patterns and connections that even the most highly skilled analysts would struggle to recognize on their own. To learn more about i2 and see an interactive demo, visit https://ibm.co/2uKWaiu.

Om Podcasten

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940