Adversary Detection Pipelines - Finally Making Your Threat Intel Useful
Offered By: 0xdade via YouTube
Course Description
Overview
Explore how to extract more value from threat intelligence programs and operationalize them within organizations in this 52-minute conference talk from Shmoocon 2020. Delve into the challenges of true attribution, including false flag operations and proxy attackers, and learn why Tactics, Techniques, and Procedures (TTPs) offer a cost-effective alternative for tracking threat activity groups. Discover Adversary Detection Pipelines and their practical implementation to prioritize defensive and offensive activities. Examine case studies demonstrating how purple teams can leverage these pipelines to enhance operations and foster intelligence-driven security programs. Gain insights from Xena Olsen, a threat intelligence analyst in the financial services industry with extensive cybersecurity credentials, as she shares strategies to level up security teams and departments.
Syllabus
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful - Xena Olsen (Shmoocon 2020)
Taught by
0xdade
Related Courses
Chip Decapping on a Budget0xdade via YouTube Adventures in Hardware Hacking or Building Expensive Tools on a Budget
0xdade via YouTube Whitelisting LD PRELOAD for Fun and No Profit
0xdade via YouTube 5G Protocol Vulnerabilities and Exploits
0xdade via YouTube Real World Zero Trust Implementation
0xdade via YouTube