{"id":10517,"date":"2023-03-10T12:30:00","date_gmt":"2023-03-10T04:30:00","guid":{"rendered":"https:\/\/cybersecthreat.com\/?p=10517"},"modified":"2024-05-03T22:06:57","modified_gmt":"2024-05-03T14:06:57","slug":"cybersecthreat-and-recorded-future-first-cti-workshop","status":"publish","type":"post","link":"https:\/\/cybersecthreat.com\/zh\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/","title":{"rendered":"\u5947\u8cc7\u5b89 x Recorded Future \u5728\u53f0\u7063\u9996\u6b21\u5408\u8fa6 CTI \u5de5\u4f5c\u574a"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_ece77e-48, .wp-block-kadence-advancedheading.kt-adv-heading10517_ece77e-48[data-kb-block=\"kb-adv-heading10517_ece77e-48\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_ece77e-48 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_ece77e-48[data-kb-block=\"kb-adv-heading10517_ece77e-48\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_ece77e-48 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_ece77e-48[data-kb-block=\"kb-adv-heading10517_ece77e-48\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_ece77e-48 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_ece77e-48\">CyberSecThreat and Recorded Future recently held a three-day workshop (7 &#8211; 9 Mar 2023) in Taiwan, focused on cyber threat intelligence (CTI) for the government, financial services, and manufacturing sectors. Over 70 participants attended the event, which featured engaging speakers and provided a hands-on test drive of the Recorded Future platform.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_4f9fc3-88, .wp-block-kadence-advancedheading.kt-adv-heading10517_4f9fc3-88[data-kb-block=\"kb-adv-heading10517_4f9fc3-88\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4f9fc3-88 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_4f9fc3-88[data-kb-block=\"kb-adv-heading10517_4f9fc3-88\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4f9fc3-88 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_4f9fc3-88[data-kb-block=\"kb-adv-heading10517_4f9fc3-88\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_4f9fc3-88 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_4f9fc3-88\">The workshop began with an introduction to CTI and the Recorded Future platform, followed by a deep dive into CTI data collection and analysis techniques. Participants learned how to apply CTI to enhance cybersecurity maturity and better defend against cyber threats. The interactive sessions included case studies, discussions, and hands-on exercises, providing attendees with a practical understanding of how to leverage CTI to improve their organization&#8217;s security posture.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_7697e2-13, .wp-block-kadence-advancedheading.kt-adv-heading10517_7697e2-13[data-kb-block=\"kb-adv-heading10517_7697e2-13\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_7697e2-13 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_7697e2-13[data-kb-block=\"kb-adv-heading10517_7697e2-13\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_7697e2-13 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_7697e2-13[data-kb-block=\"kb-adv-heading10517_7697e2-13\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_7697e2-13 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_7697e2-13\">Throughout the event, participants engaged with experts from Recorded Future and CyberSecThreat. Speakers included Xavier Tang, TJ Lee, and Kelvin Yip, who shared their expertise and insights on CTI and its applications in today&#8217;s digital landscape.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_ef27ce-14, .wp-block-kadence-advancedheading.kt-adv-heading10517_ef27ce-14[data-kb-block=\"kb-adv-heading10517_ef27ce-14\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_ef27ce-14 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_ef27ce-14[data-kb-block=\"kb-adv-heading10517_ef27ce-14\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_ef27ce-14 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_ef27ce-14[data-kb-block=\"kb-adv-heading10517_ef27ce-14\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_ef27ce-14 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_ef27ce-14\">The attendees were highly engaged and participated actively in the discussions and exercises, demonstrating a strong interest in learning how to use CTI to enhance their organization&#8217;s security. They were also impressed with the Recorded Future platform&#8217;s ease of use and flexibility, which enabled them to quickly and efficiently access critical threat intelligence data.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_650d3d-0e, .wp-block-kadence-advancedheading.kt-adv-heading10517_650d3d-0e[data-kb-block=\"kb-adv-heading10517_650d3d-0e\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_650d3d-0e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_650d3d-0e[data-kb-block=\"kb-adv-heading10517_650d3d-0e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_650d3d-0e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_650d3d-0e[data-kb-block=\"kb-adv-heading10517_650d3d-0e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_650d3d-0e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_650d3d-0e\">The workshop was a success, and participants left with a deeper understanding of CTI and its importance in today&#8217;s cybersecurity landscape. They also learned how the Recorded Future platform can help them collect, analyze, and act on CTI data to improve their organization&#8217;s security posture.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_5591d4-ad, .wp-block-kadence-advancedheading.kt-adv-heading10517_5591d4-ad[data-kb-block=\"kb-adv-heading10517_5591d4-ad\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_5591d4-ad mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_5591d4-ad[data-kb-block=\"kb-adv-heading10517_5591d4-ad\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_5591d4-ad img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_5591d4-ad[data-kb-block=\"kb-adv-heading10517_5591d4-ad\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_5591d4-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_5591d4-ad\">Participants praised the workshop for its practicality and relevance to their daily work, with one attendee saying, &#8220;I learned a lot about threat intelligence and how to use it in my daily work.&#8221; The instructors and speakers were also commended for their expertise and engaging presentation style. &#8220;They explained the concepts clearly and answered our questions patiently,&#8221; said another participant.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_ed59b9-18, .wp-block-kadence-advancedheading.kt-adv-heading10517_ed59b9-18[data-kb-block=\"kb-adv-heading10517_ed59b9-18\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_ed59b9-18 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_ed59b9-18[data-kb-block=\"kb-adv-heading10517_ed59b9-18\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_ed59b9-18 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_ed59b9-18[data-kb-block=\"kb-adv-heading10517_ed59b9-18\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_ed59b9-18 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_ed59b9-18\">The hands-on exercises allowed attendees to apply what they learned to solve real-world problems using Recorded Future&#8217;s platform and tools. Many attendees found the exercises to be both helpful and enjoyable, with one noting, &#8220;I enjoyed using Recorded Future&#8217;s platform and tools to solve real problems.&#8221;<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_4fb218-be, .wp-block-kadence-advancedheading.kt-adv-heading10517_4fb218-be[data-kb-block=\"kb-adv-heading10517_4fb218-be\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4fb218-be mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_4fb218-be[data-kb-block=\"kb-adv-heading10517_4fb218-be\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4fb218-be img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_4fb218-be[data-kb-block=\"kb-adv-heading10517_4fb218-be\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_4fb218-be wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_4fb218-be\">The workshop&#8217;s well-organized and structured content also drew praise, with many attendees recommending it to others who are interested in learning more about threat intelligence. One participant summed it up by saying, &#8220;The content was relevant and interesting. I would recommend it to anyone who wants to learn more about threat intelligence.&#8221;<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_76868c-2b, .wp-block-kadence-advancedheading.kt-adv-heading10517_76868c-2b[data-kb-block=\"kb-adv-heading10517_76868c-2b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_76868c-2b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_76868c-2b[data-kb-block=\"kb-adv-heading10517_76868c-2b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_76868c-2b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_76868c-2b[data-kb-block=\"kb-adv-heading10517_76868c-2b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_76868c-2b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_76868c-2b\">Several participants also highlighted the uniqueness of Recorded Future&#8217;s platform and its features compared to other CTI vendors. &#8220;The Recorded Future platform is unique, and it offers features that other CTI vendors don&#8217;t,&#8221; said one attendee. &#8220;Thanks for giving me the chance to learn about Recorded Future, and I definitely will recommend it to my peers.&#8221;<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_4d9d57-68, .wp-block-kadence-advancedheading.kt-adv-heading10517_4d9d57-68[data-kb-block=\"kb-adv-heading10517_4d9d57-68\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4d9d57-68 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_4d9d57-68[data-kb-block=\"kb-adv-heading10517_4d9d57-68\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4d9d57-68 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_4d9d57-68[data-kb-block=\"kb-adv-heading10517_4d9d57-68\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_4d9d57-68 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_4d9d57-68\">Overall, the workshop was a valuable opportunity for participants to learn from experts in the field and gain practical knowledge of how to leverage CTI to enhance their organization&#8217;s security. It also provided a platform for networking and collaboration among industry peers, fostering a strong cybersecurity community in Taiwan and beyond.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_dab1d7-84, .wp-block-kadence-advancedheading.kt-adv-heading10517_dab1d7-84[data-kb-block=\"kb-adv-heading10517_dab1d7-84\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_dab1d7-84 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_dab1d7-84[data-kb-block=\"kb-adv-heading10517_dab1d7-84\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_dab1d7-84 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_dab1d7-84[data-kb-block=\"kb-adv-heading10517_dab1d7-84\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_dab1d7-84 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_dab1d7-84\">To learn more about <a href=\"https:\/\/www.recordedfuture.com\/\">Recorded Future<\/a> and CTI, interested parties can visit <a href=\"https:\/\/www.recordedfuture.com\/\">Recorded Future<\/a>&#8216;s website or contact <a href=\"https:\/\/cybersecthreat.com\">CyberSecThreat<\/a> for more information.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_051238-4c, .wp-block-kadence-advancedheading.kt-adv-heading10517_051238-4c[data-kb-block=\"kb-adv-heading10517_051238-4c\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_051238-4c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_051238-4c[data-kb-block=\"kb-adv-heading10517_051238-4c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_051238-4c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_051238-4c[data-kb-block=\"kb-adv-heading10517_051238-4c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_051238-4c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_051238-4c\">Original registration link: <a href=\"https:\/\/cybersecthreat.com\/recorded_future_workshop_event_mar2023\/\">https:\/\/cybersecthreat.com\/recorded_future_workshop_event_mar2023\/<\/a><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading10517_4e2dde-96, .wp-block-kadence-advancedheading.kt-adv-heading10517_4e2dde-96[data-kb-block=\"kb-adv-heading10517_4e2dde-96\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4e2dde-96 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10517_4e2dde-96[data-kb-block=\"kb-adv-heading10517_4e2dde-96\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading10517_4e2dde-96 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading10517_4e2dde-96[data-kb-block=\"kb-adv-heading10517_4e2dde-96\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading10517_4e2dde-96 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10517_4e2dde-96\">Event highlights: <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7044611508370120704\/\">https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7044611508370120704\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5947\u8cc7\u5b89 \u548c Recorded Future \u8fd1\u671f\u5728\u53f0\u7063\u5408\u8fa6\u4e86\u70ba\u671f\u4e09\u5929\uff083 \u6708 7 \u65e5\u81f3 9 \u65e5\uff09\u7684\u5de5\u4f5c\u574a\uff0c\u91dd\u5c0d\u653f\u5e9c\u3001\u91d1\u878d\u670d\u52d9\u548c\u88fd\u9020\u696d\u7b49\u9818\u57df\u7684\u7db2\u8def\u5a01\u8105\u60c5\u8cc7\uff08CTI\uff09\u9032\u884c\u63a2\u8a0e\u3002\u6d3b\u52d5\u5171\u6709 70 \u591a\u540d\u53c3\u8207\u8005\uff0c\u5de5\u4f5c\u574a\u9664\u4e86\u6709\u5f15\u4eba\u5165\u52dd\u7684\u8b1b\u8005\uff0c\u4e5f\u63d0\u4f9b\u4e86\u5be6\u969b\u64cd\u4f5c Recorded Future \u5e73\u53f0\u7684\u6a5f\u6703\u3002\u5de5\u4f5c\u574a\u5f9e...<\/p>","protected":false},"author":14,"featured_media":10426,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[265,264,283,236,263],"tags":[261,260,284,262],"class_list":["post-10517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cti","category-cyber-threat-intelligence","category-events","category-news","category-threat-intelligence","tag-cti","tag-cyber-threat-intelligence","tag-events","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberSecThreat x Recorded Future&#039;s First CTI Workshop - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"CyberSecThreat &amp; Recorded Future recently held a 3-day workshop (7 - 9 Mar 2023), for the government, financial, and manufacturer sectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberSecThreat x Recorded Future&#039;s First CTI Workshop\" \/>\n<meta property=\"og:description\" content=\"CyberSecThreat and Recorded Future recently held a three-day workshop (7 - 9 Mar 2023) in Taiwan, focused on cyber threat intelligence (CTI) for the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-10T04:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-03T14:06:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1216\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CyberSecThreat Editor Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyberSecThreat Editor Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/\"},\"author\":{\"name\":\"CyberSecThreat Editor Team\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/fdcf199f6af74967b3b1ef42d3c84768\"},\"headline\":\"CyberSecThreat x Recorded Future&#8217;s First CTI Workshop\",\"datePublished\":\"2023-03-10T04:30:00+00:00\",\"dateModified\":\"2024-05-03T14:06:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/\"},\"wordCount\":579,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png\",\"keywords\":[\"CTI\",\"Cyber Threat Intelligence\",\"Events\",\"Threat Intelligence\"],\"articleSection\":[\"CTI\",\"Cyber Threat Intelligence\",\"Events\",\"News\",\"Threat Intelligence\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/\",\"name\":\"CyberSecThreat x Recorded Future's First CTI Workshop - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png\",\"datePublished\":\"2023-03-10T04:30:00+00:00\",\"dateModified\":\"2024-05-03T14:06:57+00:00\",\"description\":\"CyberSecThreat & Recorded Future recently held a 3-day workshop (7 - 9 Mar 2023), for the government, financial, and manufacturer sectors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png\",\"width\":2560,\"height\":1216,\"caption\":\"Recorded Future \u5a01\u8105\u60c5\u8cc7\u5e73\u53f0\u9ad4\u9a57\u5de5\u4f5c\u574a (Mar 2023)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"News\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/category\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberSecThreat x Recorded Future&#8217;s First CTI Workshop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/fdcf199f6af74967b3b1ef42d3c84768\",\"name\":\"CyberSecThreat Editor Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"caption\":\"CyberSecThreat Editor Team\"},\"sameAs\":[\"https:\\\/\\\/cybersecthreat.com\"],\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/zh\\\/author\\\/cst-editor\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2023\\\/03\\\/10\\\/cybersecthreat-and-recorded-future-first-cti-workshop\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberSecThreat x Recorded Future's First CTI Workshop - CyberSecThreat","description":"CyberSecThreat & Recorded Future recently held a 3-day workshop (7 - 9 Mar 2023), for the government, financial, and manufacturer sectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/","og_locale":"zh_TW","og_type":"article","og_title":"CyberSecThreat x Recorded Future's First CTI Workshop","og_description":"CyberSecThreat and Recorded Future recently held a three-day workshop (7 - 9 Mar 2023) in Taiwan, focused on cyber threat intelligence (CTI) for the","og_url":"https:\/\/cybersecthreat.com\/zh\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_published_time":"2023-03-10T04:30:00+00:00","article_modified_time":"2024-05-03T14:06:57+00:00","og_image":[{"width":2560,"height":1216,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png","type":"image\/png"}],"author":"CyberSecThreat Editor Team","twitter_card":"summary_large_image","twitter_creator":"@cybersecthreat","twitter_site":"@cybersecthreat","twitter_misc":{"\u4f5c\u8005:":"CyberSecThreat Editor Team","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"3 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#article","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/"},"author":{"name":"CyberSecThreat Editor Team","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/fdcf199f6af74967b3b1ef42d3c84768"},"headline":"CyberSecThreat x Recorded Future&#8217;s First CTI Workshop","datePublished":"2023-03-10T04:30:00+00:00","dateModified":"2024-05-03T14:06:57+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/"},"wordCount":579,"commentCount":0,"publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"image":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png","keywords":["CTI","Cyber Threat Intelligence","Events","Threat Intelligence"],"articleSection":["CTI","Cyber Threat Intelligence","Events","News","Threat Intelligence"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/","url":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/","name":"CyberSecThreat x Recorded Future's First CTI Workshop - CyberSecThreat","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png","datePublished":"2023-03-10T04:30:00+00:00","dateModified":"2024-05-03T14:06:57+00:00","description":"CyberSecThreat & Recorded Future recently held a 3-day workshop (7 - 9 Mar 2023), for the government, financial, and manufacturer sectors.","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min.png","width":2560,"height":1216,"caption":"Recorded Future \u5a01\u8105\u60c5\u8cc7\u5e73\u53f0\u9ad4\u9a57\u5de5\u4f5c\u574a (Mar 2023)"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News","item":"https:\/\/cybersecthreat.com\/category\/news\/"},{"@type":"ListItem","position":2,"name":"CyberSecThreat x Recorded Future&#8217;s First CTI Workshop"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"Person","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/fdcf199f6af74967b3b1ef42d3c84768","name":"\u5947\u8cc7\u5b89\u7de8\u8f2f\u5718\u968a","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","caption":"CyberSecThreat Editor Team"},"sameAs":["https:\/\/cybersecthreat.com"],"url":"https:\/\/cybersecthreat.com\/zh\/author\/cst-editor\/"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2023\/03\/10\/cybersecthreat-and-recorded-future-first-cti-workshop\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"category":[{"value":265,"label":"CTI"},{"value":264,"label":"Cyber Threat Intelligence"},{"value":283,"label":"Events"},{"value":236,"label":"News"},{"value":263,"label":"Threat Intelligence"}],"post_tag":[{"value":261,"label":"CTI"},{"value":260,"label":"Cyber Threat Intelligence"},{"value":284,"label":"Events"},{"value":262,"label":"Threat Intelligence"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/02\/Recorded_Future_Workshop_Event_Mar_2693\u200a\u00d7\u200a1279-min-1024x486.png",1024,486,true],"author_info":{"display_name":"CyberSecThreat Editor Team","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/cst-editor\/"},"comment_info":3,"category_info":[{"term_id":265,"name":"CTI","slug":"cti","term_group":0,"term_taxonomy_id":265,"taxonomy":"category","description":"","parent":0,"count":10,"filter":"raw","cat_ID":265,"category_count":10,"category_description":"","cat_name":"CTI","category_nicename":"cti","category_parent":0},{"term_id":264,"name":"Cyber Threat Intelligence","slug":"cyber-threat-intelligence","term_group":0,"term_taxonomy_id":264,"taxonomy":"category","description":"","parent":0,"count":10,"filter":"raw","cat_ID":264,"category_count":10,"category_description":"","cat_name":"Cyber Threat Intelligence","category_nicename":"cyber-threat-intelligence","category_parent":0},{"term_id":283,"name":"Events","slug":"events","term_group":0,"term_taxonomy_id":283,"taxonomy":"category","description":"","parent":0,"count":7,"filter":"raw","cat_ID":283,"category_count":7,"category_description":"","cat_name":"Events","category_nicename":"events","category_parent":0},{"term_id":236,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":236,"taxonomy":"category","description":"Latest news of CyberSecThreat, follow us and stay tuned!","parent":0,"count":12,"filter":"raw","cat_ID":236,"category_count":12,"category_description":"Latest news of CyberSecThreat, follow us and stay tuned!","cat_name":"News","category_nicename":"news","category_parent":0},{"term_id":263,"name":"Threat Intelligence","slug":"threat-intelligence","term_group":0,"term_taxonomy_id":263,"taxonomy":"category","description":"","parent":0,"count":10,"filter":"raw","cat_ID":263,"category_count":10,"category_description":"","cat_name":"Threat Intelligence","category_nicename":"threat-intelligence","category_parent":0}],"tag_info":[{"term_id":261,"name":"CTI","slug":"cti","term_group":0,"term_taxonomy_id":261,"taxonomy":"post_tag","description":"","parent":0,"count":9,"filter":"raw"},{"term_id":260,"name":"Cyber Threat Intelligence","slug":"cyber-threat-intelligence","term_group":0,"term_taxonomy_id":260,"taxonomy":"post_tag","description":"","parent":0,"count":10,"filter":"raw"},{"term_id":284,"name":"Events","slug":"events","term_group":0,"term_taxonomy_id":284,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":262,"name":"Threat Intelligence","slug":"threat-intelligence","term_group":0,"term_taxonomy_id":262,"taxonomy":"post_tag","description":"","parent":0,"count":10,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/10517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=10517"}],"version-history":[{"count":0,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/10517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/10426"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=10517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/categories?post=10517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/tags?post=10517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}