{"id":85071,"date":"2026-01-07T09:18:03","date_gmt":"2026-01-07T09:18:03","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85071"},"modified":"2026-04-29T12:38:34","modified_gmt":"2026-04-29T12:38:34","slug":"building-a-cloud-security-strategy-with-ai-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/","title":{"rendered":"Building a Cloud Security Strategy with AI &#038; Threat Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85071\" class=\"elementor elementor-85071\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a642ad6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a642ad6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5822d23\" data-id=\"5822d23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82d959 elementor-widget elementor-widget-text-editor\" data-id=\"c82d959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: <span class=\"NormalTextRun SCXW200177310 BCX0\">May<\/span><span class=\"NormalTextRun SCXW200177310 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW200177310 BCX0\">2<\/span><span class=\"NormalTextRun SCXW200177310 BCX0\">6, 202<\/span><span class=\"NormalTextRun SCXW200177310 BCX0\">6<\/span><\/div><div><strong>Time<\/strong>: <span class=\"NormalTextRun SCXW52374772 BCX0\">9.30 PM AEST\u00a0<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">|\u00a0<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">7<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">:30\u00a0<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">A<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">M\u00a0<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">ED<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">T |\u00a0<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">5<\/span><span class=\"NormalTextRun SCXW52374772 BCX0\">:00 PM IST<\/span><\/div><div><p><strong>Topic: <\/strong><span class=\"TextRun SCXW216934176 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW216934176 BCX0\"><span class=\"TextRun SCXW134177611 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW134177611 BCX0\">Building a Cloud Security Strategy with AI and Threat Intelligence<\/span><\/span><\/span><\/span><\/p><p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/7463168724694830174?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p><p><strong>Abstract: <\/strong><span class=\"TextRun SCXW244920971 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW244920971 BCX0\"><span class=\"TextRun SCXW243278897 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW243278897 BCX0\">As<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">\u00a0organizations accelerate cloud adoption, traditional security approaches often fall short in addressing dynamic, distributed, and continuously evolving environments. The current\u00a0<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">webinar<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">\u00a0explores how integrating AI with threat intelligence can help organizations build a resilient and adaptive cloud security strategy. The\u00a0<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">webinar<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">\u00a0will explore how AI enhances threat detection, risk\u00a0<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">prioritization, and anomaly identification across multi-cloud and hybrid infrastructures. The session will also highlight how real-time and contextual threat intelligence can be operationalized to strengthen visibility, automate responses, and proactively defend against emerging threats. Join us to gain insights into how combining strategic frameworks with practical implementation guidance will equip security leaders to design cloud security programs that are both scalable and\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW243278897 BCX0\">intelligence-driven<\/span><span class=\"NormalTextRun SCXW243278897 BCX0\">.<\/span><\/span><span class=\"EOP SCXW243278897 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/span><\/span><\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li><span class=\"TextRun SCXW118600071 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW118600071 BCX0\">Understanding the role of AI in modern cloud security architectures<\/span><\/span><span class=\"EOP SCXW118600071 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span class=\"TextRun SCXW7608737 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW7608737 BCX0\">Leveraging threat intelligence for proactive risk identification and mitigation<\/span><\/span><span class=\"EOP SCXW7608737 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span class=\"TextRun SCXW260119162 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW260119162 BCX0\">Enhancing visibility and monitoring across multi-cloud environments<\/span><\/span><span class=\"EOP SCXW260119162 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span class=\"TextRun SCXW71435439 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW71435439 BCX0\">Automating threat detection and response using AI-driven insights<\/span><\/span><\/li><li><span class=\"EOP SCXW142912617 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><span class=\"TextRun SCXW108669490 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW108669490 BCX0\">Aligning cloud security strategy with business and compliance objectives<\/span><\/span><\/span><\/li><li><span class=\"TextRun SCXW170742789 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW170742789 BCX0\">Integrating AI and threat intelligence into existing security operations<\/span><\/span><span class=\"EOP SCXW170742789 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Sentil-Head-Shot-1-3.png\" width=\"192\" height=\"256\" \/><strong><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW67511202 BCX0\"><span class=\"NormalTextRun SCXW3101969 BCX0\">Sentil <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW3101969 BCX0\">Velaytham<\/span><\/span>,<\/strong> <span class=\"NormalTextRun SCXW67511202 BCX0\"><span class=\"TextRun SCXW21209701 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW21209701 BCX0\">Solutions Architect.<\/span><\/span><\/span><\/p><p><strong>Bio:<\/strong><span data-contrast=\"auto\">Sentil\u00a0Velaytham\u00a0is an accomplished technical strategist with deep\u00a0expertise\u00a0across the full IT infrastructure stack, including cloud, data\u00a0centre, networking, and data protection. He has a proven\u00a0track record\u00a0of helping\u00a0organisations\u00a0navigate complex technology environments and align infrastructure strategies with business\u00a0objectives\u00a0through practical, scalable solutions.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Throughout his career, Sentil has partnered with a broad ecosystem of leading technology vendors, including VMware, Microsoft, AWS, Druva, Commvault, Veeam, Cohesity, Rubrik, Dell EMC, NetApp, Cisco, Juniper Networks, Extreme Networks, Hewlett Packard Enterprise (HPE), and Nutanix. This diverse exposure enables him to bring a balanced, vendor-agnostic perspective to modern IT challenges.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">He is particularly passionate about cybersecurity, advocating for a security-first approach that is embedded across every layer of the infrastructure stack. By integrating security into cloud, network, and data platforms, Sentil helps\u00a0organisations\u00a0build resilient, future-ready environments. He combines strong technical depth and leadership with strategic insight and is a trusted voice in infrastructure transformation and security-led innovation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May\u00a026, 2026Time: 9.30 PM AEST\u00a0|\u00a07:30\u00a0AM\u00a0EDT |\u00a05:00 PM IST Topic: Building a Cloud Security Strategy with AI and Threat Intelligence Register Now Abstract: As\u00a0organizations accelerate cloud adoption, traditional security approaches often fall short in addressing dynamic, distributed, and continuously evolving environments. The current\u00a0webinar\u00a0explores how integrating AI with threat intelligence can help organizations build a resilient&hellip;<\/p>\n","protected":false},"author":33,"featured_media":85072,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85071","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building a Cloud Security Strategy with AI &amp; Threat Intelligence<\/title>\n<meta name=\"description\" content=\"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building a Cloud Security Strategy with AI &amp; Threat Intelligence\" \/>\n<meta property=\"og:description\" content=\"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-07T09:18:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T12:38:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/26-may_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Building a Cloud Security Strategy with AI &#038; Threat Intelligence\",\"datePublished\":\"2026-01-07T09:18:03+00:00\",\"dateModified\":\"2026-04-29T12:38:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/\"},\"wordCount\":363,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/26-may_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/\",\"name\":\"Building a Cloud Security Strategy with AI & Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/26-may_465x310-Without-RN.png\",\"datePublished\":\"2026-01-07T09:18:03+00:00\",\"dateModified\":\"2026-04-29T12:38:34+00:00\",\"description\":\"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/26-may_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/26-may_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-ai-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Upcoming Cybertalks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/upcoming-cybertalks\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Building a Cloud Security Strategy with AI &#038; Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building a Cloud Security Strategy with AI & Threat Intelligence","description":"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Building a Cloud Security Strategy with AI & Threat Intelligence","og_description":"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-07T09:18:03+00:00","article_modified_time":"2026-04-29T12:38:34+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/26-may_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Building a Cloud Security Strategy with AI &#038; Threat Intelligence","datePublished":"2026-01-07T09:18:03+00:00","dateModified":"2026-04-29T12:38:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/"},"wordCount":363,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/26-may_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/","name":"Building a Cloud Security Strategy with AI & Threat Intelligence","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/26-may_465x310-Without-RN.png","datePublished":"2026-01-07T09:18:03+00:00","dateModified":"2026-04-29T12:38:34+00:00","description":"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/26-may_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/26-may_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-ai-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Upcoming Cybertalks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/upcoming-cybertalks\/"},{"@type":"ListItem","position":5,"name":"Building a Cloud Security Strategy with AI &#038; Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85071"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85071\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85072"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}