YoVDO

Leveraging Threat Intelligence in the Prioritization of Detection Sources - DefCamp - 2021

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Threat Intelligence Courses

Course Description

Overview

Explore a comprehensive conference talk from DefCamp 2021 on leveraging threat intelligence to prioritize detection sources in cybersecurity. Delve into trap modeling, MITRE ATT&CK framework, and the MISRA Matrix for identifying threat actors. Learn about external and internal threat intelligence sources, and how to use the MicroAttack Navigator for visualization. Gain practical insights through an example exercise and a real customer case study. Enhance your ability to identify and prioritize detection sources in information security, drawing from the expertise shared at one of Central and Eastern Europe's most significant hacking and InfoSec conferences.

Syllabus

Introduction
Who am I
Trap modeling
Threat intelligence sources
What is MISRA
MISRA Matrix
Identifying threat actors
Identifying draft actors
External threat intelligence sources
Internal threat intelligence sources
MicroAttack Navigator
Identifying detection sources
Detect
Data Sources
List of Detection Sources
Example Exercise
Navigator Visualization
Customer Example
Remarks
Outro


Taught by

DefCamp

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera