YoVDO

Threat Intelligence - A Program Strategy Approach

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Threat Intelligence Courses Research Methodology Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive strategy for implementing a threat intelligence program in this 37-minute conference talk from Converge 2015. Delve into research methodology, define threat intelligence, and learn how to make a compelling business case for such a program. Discover the foundational elements necessary for success, analyze the solution marketplace, and understand various intelligence sources and components. Examine fusion and analytics platforms, as well as mitigating technologies. Learn about the five goals of a maturity model and how to distinguish different threat types. Gain insights into maturity model components, develop a process model, and understand the key components explained in detail. Enhance your organization's cybersecurity posture with this informative presentation on threat intelligence program strategy.

Syllabus

Intro
Research Methodology
Defining Threat Intelligence
Making the Business Case
The Foundation for the Program
Analyzing the Solution Marketplace
Intelligence Sources Components
Another View of Intelligence Content
Fusion and Analytics Platforms
Mitigating Technologies
5 goals of a maturity model
Distinguishing Threat Types
Maturity Model Components
Developing a Process Model
Components Explained


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube