YoVDO

Value of Threat Intelligence - Stealthcare

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the value of threat intelligence in cybersecurity through this conference talk from SecureWV/Hack3rcon 2017. Delve into the definition and misconceptions of threat intelligence, examining real-world examples like the WannaCry ransomware outbreak. Discover how Zero Day Live (ZDL) predicts and prevents global cyber threats, saving corporations millions. Learn about the importance of external threat intelligence, ZDL's unique approach to sharing intelligence within enterprises, and its battle-tested, purpose-built solutions. Understand the categorization of intelligence as tactical, raw, or finished, and gain insights into selecting a threat intelligence vendor. Examine ZDL's global intelligence gathering and market presence, as well as its recognition for security leadership in the industry.

Syllabus

Intro
WHAT IS THREAT INTELLIGENCE (TI)?
THREAT INTELLIGENCE (TI) IS NOT?
ZDL PREDICTED GLOBAL WANNACRY RANSOMWARE OUTBREAK
3 MAIN POINTS
IS THE PROBLEM
WHAT DOES ZDL DO?
WHY IS ZDL BETTER?
WHAT DOES ZDL DO THAT OTHERS DO NOT?
WHY THREAT INTELLIGENCE IS KEY
ZDL SAVES CORPORATIONS SMILLIONS
USE EXTERNAL THREAT INTELLIGENCE TO UNDERSTAND AND PREVENT THREATS
ZDL'S DIFFERENTIATOR: SHARING INTELLIGENCE WITHIN ENTERPRISE
PURPOSE BUILT | BATTLE TESTED
AHEAD OF THE COMPETITION
INTELLIGENCE IS CATEGORIZED AS TACTICAL, RAW OR FINISHED
W MUCH OF THE THREAT INTELLIGENCE IS FINISHED, RAW OR TACTICAL
LECTING A THREAT INTELLIGENCE VENDOR WHERE ARE THE THREATS HUNTED?
RECOGNIZED FOR SECURITY LEADERSHIP
GLOBAL INTELLIGENCE, GLOBAL MARKET


Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera