YoVDO

SANS 2022 Cyber Threat Intelligence Survey - Key Findings and Adaptations

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Cyber Threat Intelligence Courses Data Analysis Courses Cybersecurity Courses Ransomware Courses Risk Assessment Courses Industrial Control Systems Courses Security Operations Centers Courses Remote Work Security Courses Threat Landscape Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolving landscape of cyber threat intelligence in this comprehensive 2-hour webinar from Dragos: ICS Cybersecurity. Delve into the key findings of the SANS 2022 Cyber Threat Intelligence Survey, examining how CTI professionals adapted to global shifts in work environments and threat landscapes. Gain insights on the changing needs of cyber threat intelligence due to remote work practices, the role of CTI in addressing the rise of ransomware, and its importance in preparing organizations for unpredictable, high-impact events. Learn about the most useful forms of CTI, requirements gathering, source selection, processing techniques, analysis methods, and dissemination strategies. Discover the tools used by CTI professionals and explore future trends in the field. Benefit from expert discussions on the value of CTI, best practices for collecting the right data feeds, and real-world examples of device data analysis in security operations centers.

Syllabus

Introduction
Most Useful Forms
Requirements
Sources
Processing
Analysis
dissemination
tools used
Moving forward
Megan Gooch
Agenda Slide
Survey Question 16
Survey Question 23
Survey Question 24
Wrap Up
Value of CTI
Collect the right feeds
Security Operations Center Survey
Device Data Example


Taught by

Dragos: ICS Cybersecurity

Related Courses

Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise
LinkedIn Learning
Cyber Security Guidelines for Organizational Users
Udemy
Modern Identity Hacking - Have Hackers Really Adjusted to Constant Remote?
RSA Conference via YouTube
The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube
Evolving Cyber Threat Landscape: From Mobile Apps to Social Engineering
Infosecurity Europe via YouTube