YoVDO

Operationalizing Threat Intelligence for Collective Defense

Offered By: nullcon via YouTube

Tags

nullcon Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Explore advanced strategies for operationalizing threat intelligence in this 43-minute webinar from NULLCON. Learn how to automate the collection, analysis, and dissemination of threat data to generate predictive intelligence and enhance organizational visibility. Discover the benefits of a closed trusted sharing environment and a hub-and-spoke model for correlating and enriching real-time threat information from diverse sources. Gain insights into implementing end-to-end threat intelligence automation, leveraging mutual threat sightings, and prioritizing threats with precision confidence. Presented by Avkash Kathiriya, an experienced information security professional, this talk covers the full threat intelligence lifecycle and provides valuable knowledge for defenders seeking to stay ahead of evolving cyber threats.

Syllabus

Introduction
Defense Strategies
Threat Intelligence
Data Feeds
Types of Intelligence
Transformer analogy
Automation and Collaboration
Automation is a buzzword
Automation for mundane tasks
Threat into life cycle
Threat Fusion
Collaboration
Three Phases
First Phase
Second Phase
Summary
Resources
Question Answer


Taught by

nullcon

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera