Leveraging Threat Intelligence in the Prioritization of Detection Sources - DefCamp - 2021
Offered By: DefCamp via YouTube
Course Description
Overview
Explore a comprehensive conference talk from DefCamp 2021 on leveraging threat intelligence to prioritize detection sources in cybersecurity. Delve into trap modeling, MITRE ATT&CK framework, and the MISRA Matrix for identifying threat actors. Learn about external and internal threat intelligence sources, and how to use the MicroAttack Navigator for visualization. Gain practical insights through an example exercise and a real customer case study. Enhance your ability to identify and prioritize detection sources in information security, drawing from the expertise shared at one of Central and Eastern Europe's most significant hacking and InfoSec conferences.
Syllabus
Introduction
Who am I
Trap modeling
Threat intelligence sources
What is MISRA
MISRA Matrix
Identifying threat actors
Identifying draft actors
External threat intelligence sources
Internal threat intelligence sources
MicroAttack Navigator
Identifying detection sources
Detect
Data Sources
List of Detection Sources
Example Exercise
Navigator Visualization
Customer Example
Remarks
Outro
Taught by
DefCamp
Related Courses
Proactive Computer SecurityUniversity of Colorado System via Coursera Security in Office 365
Microsoft via edX Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Cyber Threat Intelligence
IBM via Coursera Security Analyst Fundamentals
IBM via Coursera