Webinar

Industry Leaders

About Our Experts

Colin Whittaker

 Founder & Director at Informed Risk Decisions Ltd
Colin is a leading PCI industry expert with decades of experience shaping global payment security. After retiring from the military, he led security at APACS, served on the PCI SSC Board of Advisors, and influenced major compliance initiatives at Visa Europe. He now provides cybersecurity risk consulting and speaks internationally on security.

Allan Liska

Senior Security Architect at Recorded Future
Allan brings over 15 years of cybersecurity experience, helping organizations strengthen their security posture through intelligence-led strategies. With expertise as an ethical hacker and security practitioner, he has contributed to multiple security programs and authored key publications on network security, DNS defense, and ransomware mitigation strategies.

Andrew Pendergast

Executive Vice President of Product at ThreatConnect
Andrew has more than 15 years of experience in intelligence-driven security and cyber defense. He has built and led professional services, product management, and customer success teams while shaping threat intelligence methodologies. Andrew co-authored “The Diamond Model for Intrusion Analysis” and continues to innovate in holistic security solutions for global organizations.

Aubrey Turner

Executive Advisor at Ping Identity
Aubrey has extensive experience delivering enterprise cybersecurity solutions that reduce risk and drive business outcomes. Skilled in risk management, BCP/DRP, application and network security, and threat vulnerability management, Aubrey has successfully guided organizations across multiple sectors, including finance, healthcare, retail, and software, while holding key certifications like CISSP, CISA, and CRISC.

Applying Threat Intelligence to Drive Control Assurance and Effectiveness

Feb 25 / IT GRC Forum

As cybercriminals continually evolve their tactics—from broad, opportunistic attacks to highly targeted campaigns—the frequency and impact of security incidents is rising. Organizations need a robust IT security strategy that integrates data-driven threat intelligence (TI) at its core to stay ahead of these evolving threats.


Many organizations start with raw threat feeds but struggle to convert massive amounts of data into actionable insights. This webinar explores the types of threat intelligence that provide the greatest value and demonstrates how to apply it to improve IT control assurance and operational effectiveness. Attendees will learn how to leverage intelligence sources effectively, receive fully contextualized alerts with minimal false positives, detect emerging threats and attack methods, and implement actionable intelligence across their security programs. By understanding and applying high-quality threat intelligence, organizations can strengthen their security posture, reduce incident response times, and continually improve the efficiency and effectiveness of their security operations, ensuring their defenses remain proactive and resilient.