<img src="https://ws.zoominfo.com/pixel/cEO5AncHScwpt6EaX0mY" width="1" height="1" style="display: none;">


Pep Talks

In this series of videos, renowned cyber security expert Michael Pepin will discuss methods for improving your cybersecurity awareness, proactive cyber defense strategies, and understanding how to make the most of your cyber threat intelligence.


Where does cyber threat intelligence come from? In this video, Pep breaks down three main sources of CTI, including local intelligence— your own data— which is highly specific threat intelligence most relevant to you, making it a critical tool for real-time cyber defense. Understand how these sources benefit you, and how to make the most of them, in our first Pep Talk: Sources.


Michael Pepin is the Senior Solutions engineer at Celerium™ and creator of the popular PickUpStix and Hail-a-Taxii (STIX/TAXII), a repository of Open Source Cyber Threat Intelligence feeds in STIX format.

Pep has an extensive background in both commercial and DOD security, with more than 15 years of hands-on security engineering experience. He has worked in applied information securities and research, and is an expert in government and commercial cyber collection and defense, briefing a wide variety of senior professionals ranging from generals and officers in the US military to C-Level executives.



Configurable Solutions

Proactive Defense

Which solutions will empower your cyber threat intelligence program?


Community Cyber Defense

A unique mechanism that makes the community and members more cyber secure.


Cyber Defense Collaboration

A secure communication portal to discuss cyber threat intelligence and other cyber security concerns.


Machine-to-Machine Threat Sharing

A threat router utilizing STIX/TAXII, giving you one place to receive all your cyber threat intelligence from all your sources.