Operationalizing Threat Intelligence for Collective Defense
Offered By: nullcon via YouTube
Course Description
Overview
Explore advanced strategies for operationalizing threat intelligence in this 43-minute webinar from NULLCON. Learn how to automate the collection, analysis, and dissemination of threat data to generate predictive intelligence and enhance organizational visibility. Discover the benefits of a closed trusted sharing environment and a hub-and-spoke model for correlating and enriching real-time threat information from diverse sources. Gain insights into implementing end-to-end threat intelligence automation, leveraging mutual threat sightings, and prioritizing threats with precision confidence. Presented by Avkash Kathiriya, an experienced information security professional, this talk covers the full threat intelligence lifecycle and provides valuable knowledge for defenders seeking to stay ahead of evolving cyber threats.
Syllabus
Introduction
Defense Strategies
Threat Intelligence
Data Feeds
Types of Intelligence
Transformer analogy
Automation and Collaboration
Automation is a buzzword
Automation for mundane tasks
Threat into life cycle
Threat Fusion
Collaboration
Three Phases
First Phase
Second Phase
Summary
Resources
Question Answer
Taught by
nullcon
Related Courses
Proactive Computer SecurityUniversity of Colorado System via Coursera Security in Office 365
Microsoft via edX Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Cyber Threat Intelligence
IBM via Coursera Security Analyst Fundamentals
IBM via Coursera