How to Grow and Integrate Your Threat Intelligence Program

ReliaQuest’s Casey Martin on How to Mature Your Threat Intelligence Program

Finding the right balance of high-quality threat intelligence to reduce noise and mitigate the most serious risks—and then integrating this effectively into security programs—is where many organizations struggle. Casey Martin of ReliaQuest shares insight on the keys to maturing threat intelligence programs for improved visibility and high-fidelity detection and response.

In a video interview with ISMG, Martin discusses:

• Qualities that define threat intelligence maturity.
• Technical barriers to integrating threat intelligence across the security lifecycle.
• Key business benefits to an integrated approach—and how to achieve them.

Casey Martin is an information security professional with a curiosity for enabling blue team operations. Casey has operated in all technical aspects of security operations as well as leading the customer enablement effort as the Director of Security Operations for some of the world’s most trusted brands. In his current role, Casey leads the Threat Management function at ReliaQuest, which engages him in innovative functions such as SOC research and development, threat intelligence, and red team operations.

“@context”: “”,
“@type”: “VideoObject”,
“description”: “Learn how to grow and integrate your threat intelligence program with Casey Martin from ReliaQuest in this podcast.”,
“thumbnailUrl”: “[email protected]jpg”,
“uploadDate”: “2020-08-27”,
“duration”: “PT6M22S”,
“publisher”: {
“@type”: “Organization”,
“name”: “”,
“logo”: {
“@type”: “ImageObject”,
“url”: “”,
“width”: 222,
“height”: 0
“contentUrl”: “”,
“potentialAction”: {
“@type”: “SeekToAction”,
“target”: “{seek_to_second_number}”,
“startOffset-input”: “required name=seek_to_second_number”

Read the Transcript

More resources

Maximize Your Threat Intelligence

When integrated across security controls, threat intelligence allows security teams to increase detection rates, speed response times, and mitigate their most serious risks. But finding the balance between too little and too much intel – and then automating the integration of these feeds – is the challenge. Too little intel, and your organization runs the […]

3 Proven Methods for Implementing a Continual Threat Hunting Program .btn {display: none;}.aspect-ratio-16\:9.margin-bottom-md {margin-top: 35px;} Enterprise Security teams are looking for proven ways to increase the visibility of their security programs while also optimizing technology investments. A large number of organizations have implemented Endpoint Detection and Response (EDR) solutions and many others are considering it. While these solutions are best known as being effective […]