YoVDO

Adversary Detection Pipelines - Finally Making Your Threat Intel Useful

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Threat Intelligence Courses Security Operations Courses

Course Description

Overview

Explore how to extract more value from threat intelligence programs and operationalize them within organizations in this 52-minute conference talk from Shmoocon 2020. Delve into the challenges of true attribution, including false flag operations and proxy attackers, and learn why Tactics, Techniques, and Procedures (TTPs) offer a cost-effective alternative for tracking threat activity groups. Discover Adversary Detection Pipelines and their practical implementation to prioritize defensive and offensive activities. Examine case studies demonstrating how purple teams can leverage these pipelines to enhance operations and foster intelligence-driven security programs. Gain insights from Xena Olsen, a threat intelligence analyst in the financial services industry with extensive cybersecurity credentials, as she shares strategies to level up security teams and departments.

Syllabus

Adversary Detection Pipelines: Finally Making Your Threat Intel Useful - Xena Olsen (Shmoocon 2020)


Taught by

0xdade

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera