YoVDO

Adversary Detection Pipelines - Finally Making Your Threat Intel Useful

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Threat Intelligence Courses Security Operations Courses

Course Description

Overview

Explore how to extract more value from threat intelligence programs and operationalize them within organizations in this 52-minute conference talk from Shmoocon 2020. Delve into the challenges of true attribution, including false flag operations and proxy attackers, and learn why Tactics, Techniques, and Procedures (TTPs) offer a cost-effective alternative for tracking threat activity groups. Discover Adversary Detection Pipelines and their practical implementation to prioritize defensive and offensive activities. Examine case studies demonstrating how purple teams can leverage these pipelines to enhance operations and foster intelligence-driven security programs. Gain insights from Xena Olsen, a threat intelligence analyst in the financial services industry with extensive cybersecurity credentials, as she shares strategies to level up security teams and departments.

Syllabus

Adversary Detection Pipelines: Finally Making Your Threat Intel Useful - Xena Olsen (Shmoocon 2020)


Taught by

0xdade

Related Courses

Palo Alto Networks Cybersecurity
Palo Alto Networks via Coursera
(ISC)² Systems Security Certified Practitioner (SSCP)
(ISC)² via Coursera
CompTIA Security+ (SY0-701) Complete Course & Exam
Udemy
SSCP®: Monitoring and Analysis & Risk, Response, and Recovery (2012 Objectives)
Pluralsight
SSCP®: Security Operations and Administration
Pluralsight