YoVDO

From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Risk Management Courses Threat Intelligence Courses

Course Description

Overview

Explore a comprehensive approach to translating threat intelligence into actionable defensive strategies in this 27-minute Black Hat conference talk. Delve into the challenges of the current "Golden Age of Threat" and learn how the non-profit Council on CyberSecurity has developed a community-driven method to address these issues. Discover the evolution of their process, from informal brainstorming to a structured workflow incorporating multiple authoritative threat sources. Understand how this approach aligns with various Risk Management Frameworks, including the NIST Cybersecurity Framework. Gain insights on extracting value from vast amounts of threat information, leveraging expert knowledge, and implementing crucial defensive actions to enhance cybersecurity resilience.

Syllabus

From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube