YoVDO

Operationalizing Threat Intelligence for Collective Defense

Offered By: nullcon via YouTube

Tags

nullcon Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Explore advanced strategies for operationalizing threat intelligence in this 43-minute webinar from NULLCON. Learn how to automate the collection, analysis, and dissemination of threat data to generate predictive intelligence and enhance organizational visibility. Discover the benefits of a closed trusted sharing environment and a hub-and-spoke model for correlating and enriching real-time threat information from diverse sources. Gain insights into implementing end-to-end threat intelligence automation, leveraging mutual threat sightings, and prioritizing threats with precision confidence. Presented by Avkash Kathiriya, an experienced information security professional, this talk covers the full threat intelligence lifecycle and provides valuable knowledge for defenders seeking to stay ahead of evolving cyber threats.

Syllabus

Introduction
Defense Strategies
Threat Intelligence
Data Feeds
Types of Intelligence
Transformer analogy
Automation and Collaboration
Automation is a buzzword
Automation for mundane tasks
Threat into life cycle
Threat Fusion
Collaboration
Three Phases
First Phase
Second Phase
Summary
Resources
Question Answer


Taught by

nullcon

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network