Adversary Detection Pipelines - Finally Making Your Threat Intel Useful
Offered By: 0xdade via YouTube
Course Description
Overview
Explore how to extract more value from threat intelligence programs and operationalize them within organizations in this 52-minute conference talk from Shmoocon 2020. Delve into the challenges of true attribution, including false flag operations and proxy attackers, and learn why Tactics, Techniques, and Procedures (TTPs) offer a cost-effective alternative for tracking threat activity groups. Discover Adversary Detection Pipelines and their practical implementation to prioritize defensive and offensive activities. Examine case studies demonstrating how purple teams can leverage these pipelines to enhance operations and foster intelligence-driven security programs. Gain insights from Xena Olsen, a threat intelligence analyst in the financial services industry with extensive cybersecurity credentials, as she shares strategies to level up security teams and departments.
Syllabus
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful - Xena Olsen (Shmoocon 2020)
Taught by
0xdade
Related Courses
Palo Alto Networks CybersecurityPalo Alto Networks via Coursera (ISC)² Systems Security Certified Practitioner (SSCP)
(ISC)² via Coursera CompTIA Security+ (SY0-701) Complete Course & Exam
Udemy SSCP®: Monitoring and Analysis & Risk, Response, and Recovery (2012 Objectives)
Pluralsight SSCP®: Security Operations and Administration
Pluralsight