YoVDO

Leveraging Threat Intelligence in the Prioritization of Detection Sources - DefCamp - 2021

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Threat Intelligence Courses

Course Description

Overview

Explore a comprehensive conference talk from DefCamp 2021 on leveraging threat intelligence to prioritize detection sources in cybersecurity. Delve into trap modeling, MITRE ATT&CK framework, and the MISRA Matrix for identifying threat actors. Learn about external and internal threat intelligence sources, and how to use the MicroAttack Navigator for visualization. Gain practical insights through an example exercise and a real customer case study. Enhance your ability to identify and prioritize detection sources in information security, drawing from the expertise shared at one of Central and Eastern Europe's most significant hacking and InfoSec conferences.

Syllabus

Introduction
Who am I
Trap modeling
Threat intelligence sources
What is MISRA
MISRA Matrix
Identifying threat actors
Identifying draft actors
External threat intelligence sources
Internal threat intelligence sources
MicroAttack Navigator
Identifying detection sources
Detect
Data Sources
List of Detection Sources
Example Exercise
Navigator Visualization
Customer Example
Remarks
Outro


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube