This webinar will walk through the top five critical things to know on how to access and leverage RH-ISAC shared intelligence. With a large percentage of members currently onboarded onto the RH-ISAC Threat Intelligence Sharing Platform, powered by TruSTAR, now is the time to understand how to access and use RH-ISAC shared intelligence to augment and strengthen your ability to defend against new attacks.

Key Takeaways:

  1. How TruSTAR and RH-ISAC teamed up to provide this intelligence
  2. What other intelligence sources are accessible in the platform
  3. How to access and contribute to the RH-ISAC shared Enclave
  4. How example members are sharing and using RH-ISAC intel to enrich their investigations


  • Muktar Kelati, Director, Intel Operations, RH-ISAC
  • Kevin Libby, Lead Intel Architect, TruSTAR

ELIGIBILITY: This webinar is open to RH-ISAC Core Members only. Ineligible registrants will have their registration canceled. To learn about eligibility, visit rhisac.org/membership. Email events@rhisac.org with any questions.