YoVDO

Operationalizing Threat Intelligence for Collective Defense

Offered By: nullcon via YouTube

Tags

nullcon Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Explore advanced strategies for operationalizing threat intelligence in this 43-minute webinar from NULLCON. Learn how to automate the collection, analysis, and dissemination of threat data to generate predictive intelligence and enhance organizational visibility. Discover the benefits of a closed trusted sharing environment and a hub-and-spoke model for correlating and enriching real-time threat information from diverse sources. Gain insights into implementing end-to-end threat intelligence automation, leveraging mutual threat sightings, and prioritizing threats with precision confidence. Presented by Avkash Kathiriya, an experienced information security professional, this talk covers the full threat intelligence lifecycle and provides valuable knowledge for defenders seeking to stay ahead of evolving cyber threats.

Syllabus

Introduction
Defense Strategies
Threat Intelligence
Data Feeds
Types of Intelligence
Transformer analogy
Automation and Collaboration
Automation is a buzzword
Automation for mundane tasks
Threat into life cycle
Threat Fusion
Collaboration
Three Phases
First Phase
Second Phase
Summary
Resources
Question Answer


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube