YoVDO

Death to the IOC - What's Next in Threat Intelligence

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Machine Learning Courses Threat Intelligence Courses Word Embeddings Courses

Course Description

Overview

Explore the future of threat intelligence in cybersecurity through this 26-minute Black Hat conference talk. Delve into the automation of entity extraction using machine learning techniques specific to the cybersecurity domain. Learn how to leverage ML for custom entity extraction from unstructured text, generate valuable insights, and identify patterns of attacks faced by enterprises. Discover the potential of advanced techniques like word embeddings, conditional random fields, and LSDM for improving threat intelligence capabilities. Gain insights into the challenges of unseen tokens and explore open questions in the field. Access the full abstract and presentation materials for a comprehensive understanding of this cutting-edge approach to cybersecurity threat intelligence.

Syllabus

Introduction
About Padma
Training Data
IOB Style
Word Embedding
Word Embedding Example
Word Embedding Visualization
Conditional Random Fields
LSDM
Recall
Precision
Unseen Tokens
Whats Next
Open Questions


Taught by

Black Hat

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera