• Search
  • Translate
  • Login
  • Platform
    Product Tours
    Why Flashpoint?
    Tour the Flashpoint platform – at your own pace, on your own time.
    • Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Intelligence (VulnDB)
      Physical Security Intelligence
      National Security Intelligence
      Managed Attribution
    • Integrations
      Threat Intelligence Platforms (TIP)
      Security Orchestration, Automation, and Response (SOAR)
      Security Information & Event Management (SIEM)
      Analysis & Investigations
      Product Integrations
  • Services
    • Managed Intelligence
      Curated Alerting
      Proactive Acquisitions
      Tailored Reporting Service
      Request for Information (RFI)
      Event Monitoring
      Person of Interest/Executive Investigations
    • Professional Services
      Threat Response & Readiness
      Threat Actor Engagement & Procurement
      Enhanced Monitoring
  • Solutions
    By Threats & Risks
    • Fraud
    • Ransomware
    • Account Takeover
    • Brand and Reputation
    • Vulnerability
    • Physical Security
    • National Security
    By Industry
    • Financial Services
    • Retail
    • Healthcare & Pharmaceutical
    • Technology
    • Public Sector & National Security
  • Resources
    Blog Article
    Navigating 2025’s Midyear Threats: Flashpoint’s GTII
    • Threat Intel Blog
    • Events & Webinars
    • Resource Library
    • Intelligence Glossary
    • Partners
  • Why Flashpoint
    WHY FLASHPOINT
    Comprehensive Intelligence for Mission-Critical Teams
    • Flashpoint vs. The Competition
    • Customer Stories
  • Pricing
  • Get a Demo
  • Platform
    • Flashpoint Ignite
      • Cyber Threat Intelligence
      • Vulnerability Intelligence (VulnDB)
      • Physical Security Intelligence
      • National Security Intelligence
      • Managed Attribution
    • Integrations
      • Threat Intelligence Platforms
      • Security Orchestration, Automation, and Response (SOAR)
      • Security Information & Event Management
      • Analysis and Investigations
      • Product Integrations
    • Product Tours
  • Services
    • Managed Intelligence
      • Curated Alerting
      • Proactive Acquisitions
      • Tailored Reporting Service
      • Request for Information (RFI)
      • Event Monitoring
      • Person of Interest/Executive Investigations
    • Professional Services
      • Threat Response & Readiness
      • Threat Actor Engagement & Procurement
      • Enhanced Monitoring
  • Solutions
    • By Threats & Risks
      • Financial Fraud
      • Ransomware and Data Extortion
      • Account Takeover
      • Brand Reputation
      • Vulnerability
      • Physical Security
      • National Security
    • By Industry
      • Financial Services
      • Retail
      • Healthcare & Pharmaceutical
      • Technology
      • Public Sector & National Security
  • Why Flashpoint?
    • Flashpoint vs. The Competition
    • Customer Stories
  • Resource Library
    • Threat Intelligence Blog
    • Events & Webinars
    • Resource Library
    • Cybersecurity & Intelligence 101
    • Partner With Flashpoint
  • Pricing
  • Get a Demo
  • Search
  • Translate
  • Login
  • Platform
    Product Tours
    Why Flashpoint?
    Tour the Flashpoint platform – at your own pace, on your own time.
    • Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Intelligence (VulnDB)
      Physical Security Intelligence
      National Security Intelligence
      Managed Attribution
    • Integrations
      Threat Intelligence Platforms (TIP)
      Security Orchestration, Automation, and Response (SOAR)
      Security Information & Event Management (SIEM)
      Analysis & Investigations
      Product Integrations
  • Services
    • Managed Intelligence
      Curated Alerting
      Proactive Acquisitions
      Tailored Reporting Service
      Request for Information (RFI)
      Event Monitoring
      Person of Interest/Executive Investigations
    • Professional Services
      Threat Response & Readiness
      Threat Actor Engagement & Procurement
      Enhanced Monitoring
  • Solutions
    By Threats & Risks
    • Fraud
    • Ransomware
    • Account Takeover
    • Brand and Reputation
    • Vulnerability
    • Physical Security
    • National Security
    By Industry
    • Financial Services
    • Retail
    • Healthcare & Pharmaceutical
    • Technology
    • Public Sector & National Security
  • Resources
    Blog Article
    Navigating 2025’s Midyear Threats: Flashpoint’s GTII
    • Threat Intel Blog
    • Events & Webinars
    • Resource Library
    • Intelligence Glossary
    • Partners
  • Why Flashpoint
    WHY FLASHPOINT
    Comprehensive Intelligence for Mission-Critical Teams
    • Flashpoint vs. The Competition
    • Customer Stories
  • Pricing
  • Get a Demo

The Threat Hunter’s Method: An Offensive Approach to Exposure Management

Threat hunters, vulnerability managers, and penetration testers are drowning in threat data. From compromised credentials to third-party supply chain breaches, the challenge isn’t just detecting threats—it’s knowing where to focus.

How do you focus your team’s efforts on managing exposure? What do you need to narrow in on, and what can you safely deprioritize?

Watch this on-demand webinar as Kyle Howson, Senior Manager of Threat Hunting at Air Canada, shares a practical approach to managing threat data and using intelligence to contextualize, prioritize, and respond to critical exposures.

Key Takeaways:

  • Contextualizing Your Organization’s Exposures with Threat Data: Learn how to integrate diverse data sources (OSINT, internal telemetry, external intelligence feeds) to build a complete threat picture.
  • Understanding Exploitation Impact: See how penetration testers validate vulnerability prioritization with exploitation scenarios.
  • Strategic Prioritization: Discover effective strategies and tools for identifying and addressing high-impact threats.
  • The S.I.D. Framework: Gain insights into Air Canada’s Systems, Identity, and Data(S.I.D.) Framework and how it goes beyond the traditional CIA (Confidentiality, Integrity, Availability) triad.
  • Case Example: Walk through a live case study demonstrating how the S.I.D. Framework improves exposure management, response, and remediation.
Meet The Speaker
Kyle Howson
Senior Manager, Cyber Threat Hunting at Air Canada

Kyle Howson is the Senior Manager of Cyber Threat Hunting at Air Canada. A passionate and dynamic security professional, Kyle considers himself fortunate to have turned his lifelong hobby into a career. With experience spanning network security, compliance, and security architecture, his true expertise and passion lie in offensive security. As an active member of the cybersecurity community, he is committed to collaboration and knowledge-sharing, believing that working together is key to building a more secure world.

Share This:
Watch On-Demand
  • Get a Demo
  • Login

6218 Georgia Avenue NW Suite #1
PMB 3032 Washington, DC, 20011
United States

Enter a valid business email address.


+1 (888) 458-5058

  • Platform
    • Products
      • Flashpoint Ignite
        • Cyber Threat Intelligence
        • Vulnerability Intelligence (VulnDB)
        • Physical Security Intelligence
        • National Security Intelligence
        • Managed Attribution
      • Flashpoint Integrations
    • Services
      • Managed Intelligence
        • Curated Alerting
        • Proactive Acquisitions
        • Tailored Reporting Service
        • Request for Information (RFI)
        • Event Monitoring
        • Person of Interest/Executive Investigation Services
      • Professional Services
        • Threat Response and Analysis
        • Threat Actor Engagement & Procurement
        • Enhanced Monitoring
  • Solutions
    • By Threats & Risks
      • Ransomware
      • Financial Fraud
      • Account Takeover
      • Brand Risks
      • Vulnerability Risks
      • Physical Security Threats
      • Geopolitical Risk
    • By Industry
      • Financial Services
      • Retail
      • Healthcare & Pharmaceutical
      • Technology
      • Public Sector & National Security
  • Menu Group
    • Why Flashpoint
      • Flashpoint vs. The Competition
      • Customer Stories
    • Resources
      • Threat Intelligence Blog
      • Events & Webinars
      • Resource Library
      • Cybersecurity Glossary
      • Partners
  • Company
    • Sub-menu
      • About Us
      • Careers
      • News
      • Contact Us
  • Social
© 2025 Flashpoint. All rights reserved.
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Modern Slavery Statement
  • CCPA
  • Legal