Death to the IOC - What's Next in Threat Intelligence
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the future of threat intelligence in cybersecurity through this 26-minute Black Hat conference talk. Delve into the automation of entity extraction using machine learning techniques specific to the cybersecurity domain. Learn how to leverage ML for custom entity extraction from unstructured text, generate valuable insights, and identify patterns of attacks faced by enterprises. Discover the potential of advanced techniques like word embeddings, conditional random fields, and LSDM for improving threat intelligence capabilities. Gain insights into the challenges of unseen tokens and explore open questions in the field. Access the full abstract and presentation materials for a comprehensive understanding of this cutting-edge approach to cybersecurity threat intelligence.
Syllabus
Introduction
About Padma
Training Data
IOB Style
Word Embedding
Word Embedding Example
Word Embedding Visualization
Conditional Random Fields
LSDM
Recall
Precision
Unseen Tokens
Whats Next
Open Questions
Taught by
Black Hat
Related Courses
Proactive Computer SecurityUniversity of Colorado System via Coursera Security in Office 365
Microsoft via edX Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Cyber Threat Intelligence
IBM via Coursera Security Analyst Fundamentals
IBM via Coursera