YoVDO

How Threat Intelligence Sharing and Automation Wins the War against Attackers

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Incident Response Courses Threat Detection Courses Vulnerability Management Courses Phishing Attacks Courses Security Automation Courses

Course Description

Overview

Explore a 49-minute conference talk from RSA Conference that delves into the critical role of threat intelligence sharing and automation in combating cyber attackers. Learn how security teams can leverage collective expertise to identify potential threats early, minimizing damage through effective information sharing. Discover the benefits and challenges of real-time threat intelligence sharing, gain insights from practical use cases demonstrating the value of automation and orchestration, and explore opportunities for security teams to engage with relevant groups. Examine topics such as security automation markets, threat detection automation, vulnerability prioritization, asset management, security incident response, and operationalizing threat intelligence. Gain practical knowledge on implementing automation workflows, handling high-profile vulnerabilities, and addressing phishing attacks. Understand the importance of creating a trusted circle for sharing information, ensuring anonymity and timeliness in threat intelligence exchange, and leveraging automation to prioritize vulnerability patching effectively.

Syllabus

Introduction
Security Automation Market
Threat Detection Automation
Vulnerability Scanner Data
Automating Vulnerability Prioritization
Asset Management Database
Set the Rules
Scan Data
Deploy Patch
Automation Workflow
Security Incident Response
Research and Automation
High Profile Vulnerability Planning
Vulnerability Scanner
Shellshock Example
Security Analyst Workflow
Data Enrichment Activities
Phishing Attacks
Phishing Attack Example
More Automation
Threat Intel Sharing
Operationalizing Threat Intel
Duplicative Information
Is it real
Circle of Trust
Anonymous
Timely
Automation
Prioritize vulnerability patching
Hiring talent
Questions


Taught by

RSA Conference

Related Courses

Learn Hacking and use your Android as a Hacking Machine
Udemy
Ethical Hacking for Mobile Phones, Facebook & Social Media!
Udemy
The Complete Android Ethical Hacking Practical Course C|AEHP
Udemy
Learn Networking with respect to Ethical Hacking for 2024
Udemy
Cybersecurity for Executives
LinkedIn Learning