YoVDO

Intelligence Creating Intelligence - Leveraging What You Know to Improve Finding What You Don't

Offered By: YouTube

Tags

GrrCon Courses Data Analysis Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore intelligence creation techniques in this 22-minute conference talk from GrrCon 2018. Learn how to leverage existing knowledge to improve threat intelligence gathering and utilization within enterprise environments. Discover effective methods for sourcing threat intel, avoiding common pitfalls in enterprise implementation, and enhancing intel usefulness. Gain insights on initiating the process, comparing noisy intel against historical network data, establishing parameters for low-noise indicators, and compiling actionable threat feeds. Examine additional strategies for data refinement, potential drawbacks of the approach, and real-world implementation results.

Syllabus

Intelligence Creating Intelligence: Leveraging
Where can I get Threat Intel?
Bad Ways of using Threat Intelligence in the Enterprise
What can I do to make intel more useful?
Considerations before starting
Where do I start?
Comparing the "Noisy Intel" against historical network for other data
Establishing parameters to identify low- noise indicators
Compiling the data into a usable threat feed
What are other things I can do to drill down the data?
Drawbacks of this Approach
Implementation Results


Related Courses

Dance Fancybear Dance - A Study in macOS Cat Self
YouTube
Big Plane Little Plane - How Common Aviation Attacks Affect Airlines and General Aviation
YouTube
Network Exploitation of IoT Ecosystems
YouTube
Inhumane - Making Security Hard on Criminals, Easy on Everyone Else
YouTube
Deepfakes - If Anything Can Be Real, Then Nothing Is Real
YouTube