From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive approach to translating threat intelligence into actionable defensive strategies in this 27-minute Black Hat conference talk. Delve into the challenges of the current "Golden Age of Threat" and learn how the non-profit Council on CyberSecurity has developed a community-driven method to address these issues. Discover the evolution of their process, from informal brainstorming to a structured workflow incorporating multiple authoritative threat sources. Understand how this approach aligns with various Risk Management Frameworks, including the NIST Cybersecurity Framework. Gain insights on extracting value from vast amounts of threat information, leveraging expert knowledge, and implementing crucial defensive actions to enhance cybersecurity resilience.
Syllabus
From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network