YoVDO

From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Risk Management Courses Threat Intelligence Courses

Course Description

Overview

Explore a comprehensive approach to translating threat intelligence into actionable defensive strategies in this 27-minute Black Hat conference talk. Delve into the challenges of the current "Golden Age of Threat" and learn how the non-profit Council on CyberSecurity has developed a community-driven method to address these issues. Discover the evolution of their process, from informal brainstorming to a structured workflow incorporating multiple authoritative threat sources. Understand how this approach aligns with various Risk Management Frameworks, including the NIST Cybersecurity Framework. Gain insights on extracting value from vast amounts of threat information, leveraging expert knowledge, and implementing crucial defensive actions to enhance cybersecurity resilience.

Syllabus

From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network