Operationalizing Threat Intelligence for Collective Defense
Offered By: nullcon via YouTube
Course Description
Overview
Explore advanced strategies for operationalizing threat intelligence in this 43-minute webinar from NULLCON. Learn how to automate the collection, analysis, and dissemination of threat data to generate predictive intelligence and enhance organizational visibility. Discover the benefits of a closed trusted sharing environment and a hub-and-spoke model for correlating and enriching real-time threat information from diverse sources. Gain insights into implementing end-to-end threat intelligence automation, leveraging mutual threat sightings, and prioritizing threats with precision confidence. Presented by Avkash Kathiriya, an experienced information security professional, this talk covers the full threat intelligence lifecycle and provides valuable knowledge for defenders seeking to stay ahead of evolving cyber threats.
Syllabus
Introduction
Defense Strategies
Threat Intelligence
Data Feeds
Types of Intelligence
Transformer analogy
Automation and Collaboration
Automation is a buzzword
Automation for mundane tasks
Threat into life cycle
Threat Fusion
Collaboration
Three Phases
First Phase
Second Phase
Summary
Resources
Question Answer
Taught by
nullcon
Related Courses
Unearthing Malicious and Risky OpenSource Packages Using Packjnullcon via YouTube Pushing Security Left by Mutating Byte Code
nullcon via YouTube The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube Contextomy - Let's Debug Together
nullcon via YouTube Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube