Главная
Study mode:
on
1
Introduction
2
Legal Disclaimer
3
General Disclaimer
4
Agenda
5
Is there a right way to do CTI
6
What Xena would like to see
7
Enterprise 101s
8
Why 247 CTI
9
Math
10
Tier 1 Coverage
11
Getting Started
12
Project Plan
13
Processes
14
Power
15
Frame everything
16
Critical success factor theory
17
How to perform a critical success factor analysis
18
Does this apply to us
19
Proofofconcept
20
Tier 1 Task Management
21
Tier 2 Task Management
22
Workflow Processes
23
Training methodologies
24
Screen recording software
25
Tool access
26
Intel access
27
Project considerations
28
Celebrate milestones
29
Throw that far
30
Metrics
31
Lessons Learned
32
Project Mapping
33
Takeaways
34
Thank you
35
About Xena
36
Feature your work
Description:
Explore the process of building a 24/7 Cyber Threat Intelligence (CTI) program in this informative conference talk. Learn techniques, training methodologies, and lessons learned for leveraging SOC Analysts to perform threat intelligence analysis. Discover how to implement a round-the-clock CTI program using existing tools, budget, and experience. Gain insights into enterprise considerations, project planning, critical success factor analysis, and workflow processes. Understand the importance of tiered task management, training methodologies, and metrics. Benefit from practical advice on project considerations, celebrating milestones, and mapping your CTI journey. Presented by Xena Olsen, a cyber threat intelligence analyst in the financial services industry with GIAC certifications and a focus on malware analysis.

24-7 CTI - Operationalizing Cyber Threat Intelligence

0xdade
Add to list
0:00 / 0:00