• Platform
    Products
    • Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Intelligence (VulnDB)
      Physical Security Intelligence
      National Security Intelligence
      Managed Attribution
    • Flashpoint Integrations
    Services
    • Managed Intelligence
      Curated Alerting
      Proactive Acquisitions
      Tailored Reporting Service
      Request for Information (RFI)
      Event Monitoring
      Person of Interest/Executive Investigations
    • Professional Services
      Threat Response & Readiness
      Threat Actor Engagment & Procurement
      Enhanced Monitoring
  • Solutions
    By Threats and Risks
    • Fraud
    • Ransomware
    • Account Takeover
    • Brand and Reputation
    • Vulnerability
    • Physical Security
    • National Security
    By Industry
    • Financial Services
    • Retail
    • Healthcare & Pharmaceutical
    • Technology
    • Public Sector & National Security
  • Resources
    Blog Article
    Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
    • Threat Intel Blog
    • Events & Webinars
    • Resource Library
    • Intelligence Glossary
    • Partners
  • Why Flashpoint
  • Company
    Flashpoint Research
    The Flashpoint 2025 Global Threat Intelligence Report
    • About Us
    • Careers
    • News
    • Contact Us
  • Get a Demo
  • Platform
    • Our Platform
    • Flashpoint Ignite
      • Cyber Threat Intelligence
      • Vulnerability Intelligence (VulnDB)
      • Physical Security Intelligence
      • National Security Intelligence
      • Managed Attribution
    • Services
      • Threat Readiness and Response
      • Professional Services
      • Tailored Reporting
      • Curated Alerting
      • Managed Intelligence
      • Request for Information
      • Event Monitoring
      • Person of Interest/Executive Investigation Services
  • Solutions
    • By Threats and Risks
      • Financial Fraud
      • Ransomware and Data Extortion
      • Account Takeover
      • Brand Reputation
      • Vulnerability
      • Physical Security
      • National Security
    • By Industry
      • Financial Services
      • Retail
      • Healthcare & Pharmaceutical
      • Technology
      • Public Sector & National Security
  • Why Flashpoint?
  • Resource Library
    • Threat Intelligence Blog
    • Events & Webinars
    • Resource Library
    • Cybersecurity & Intelligence 101
    • Partner With Flashpoint
  • Company
    • About Us
    • Flashpoint Careers
    • Flashpoint News
    • Contact Us
  • Get a Demo
  • Platform
    Products
    • Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Intelligence (VulnDB)
      Physical Security Intelligence
      National Security Intelligence
      Managed Attribution
    • Flashpoint Integrations
    Services
    • Managed Intelligence
      Curated Alerting
      Proactive Acquisitions
      Tailored Reporting Service
      Request for Information (RFI)
      Event Monitoring
      Person of Interest/Executive Investigations
    • Professional Services
      Threat Response & Readiness
      Threat Actor Engagment & Procurement
      Enhanced Monitoring
  • Solutions
    By Threats and Risks
    • Fraud
    • Ransomware
    • Account Takeover
    • Brand and Reputation
    • Vulnerability
    • Physical Security
    • National Security
    By Industry
    • Financial Services
    • Retail
    • Healthcare & Pharmaceutical
    • Technology
    • Public Sector & National Security
  • Resources
    Blog Article
    Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
    • Threat Intel Blog
    • Events & Webinars
    • Resource Library
    • Intelligence Glossary
    • Partners
  • Why Flashpoint
  • Company
    Flashpoint Research
    The Flashpoint 2025 Global Threat Intelligence Report
    • About Us
    • Careers
    • News
    • Contact Us
  • Get a Demo

The Threat Hunter’s Method: An Offensive Approach to Exposure Management

Threat hunters, vulnerability managers, and penetration testers are drowning in threat data. From compromised credentials to third-party supply chain breaches, the challenge isn’t just detecting threats—it’s knowing where to focus.

How do you focus your team’s efforts on managing exposure? What do you need to narrow in on, and what can you safely deprioritize?

Watch this on-demand webinar as Kyle Howson, Senior Manager of Threat Hunting at Air Canada, shares a practical approach to managing threat data and using intelligence to contextualize, prioritize, and respond to critical exposures.

Key Takeaways:

  • Contextualizing Your Organization’s Exposures with Threat Data: Learn how to integrate diverse data sources (OSINT, internal telemetry, external intelligence feeds) to build a complete threat picture.
  • Understanding Exploitation Impact: See how penetration testers validate vulnerability prioritization with exploitation scenarios.
  • Strategic Prioritization: Discover effective strategies and tools for identifying and addressing high-impact threats.
  • The S.I.D. Framework: Gain insights into Air Canada’s Systems, Identity, and Data(S.I.D.) Framework and how it goes beyond the traditional CIA (Confidentiality, Integrity, Availability) triad.
  • Case Example: Walk through a live case study demonstrating how the S.I.D. Framework improves exposure management, response, and remediation.
Meet The Speaker
Kyle Howson
Senior Manager, Cyber Threat Hunting at Air Canada

Kyle Howson is the Senior Manager of Cyber Threat Hunting at Air Canada. A passionate and dynamic security professional, Kyle considers himself fortunate to have turned his lifelong hobby into a career. With experience spanning network security, compliance, and security architecture, his true expertise and passion lie in offensive security. As an active member of the cybersecurity community, he is committed to collaboration and knowledge-sharing, believing that working together is key to building a more secure world.

Share This:
Watch On-Demand
  • Get a Demo
  • Login

6218 Georgia Avenue NW Suite #1
PMB 3032 Washington, DC, 20011
United States

Enter a valid business email address.


+1 (888) 458-5058

  • Platform
    • Products
      • Flashpoint Ignite
        • Cyber Threat Intelligence
        • Vulnerability Intelligence (VulnDB)
        • Physical Security Intelligence
        • National Security Intelligence
        • Managed Attribution
      • Flashpoint Integrations
    • Services
      • Managed Intelligence
        • Curated Alerting
        • Proactive Acquisitions
        • Tailored Reporting Service
        • Request for Information (RFI)
        • Event Monitoring
        • Person of Interest/Executive Investigation Services
      • Professional Services
        • Threat Response and Analysis
        • Threat Actor Engagement & Procurement
        • Enhanced Monitoring
  • Solutions
    • By Threats & Risks
      • Ransomware
      • Financial Fraud
      • Account Takeover
      • Brand Risks
      • Vulnerability Risks
      • Physical Security Threats
      • Geopolitical Risk
    • By Industry
      • Financial Services
      • Retail
      • Healthcare & Pharmaceutical
      • Technology
      • Public Sector & National Security
  • Menu Group
    • Why Flashpoint
    • Resources
      • Threat Intelligence Blog
      • Events & Webinars
      • Resource Library
      • Cybersecurity Glossary
      • Partners
  • Company
    • Sub-menu
      • About Us
      • Careers
      • News
      • Contact Us
  • Social
© 2025 Flashpoint. All rights reserved.
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Modern Slavery Statement
  • CCPA
  • Legal