Главная
Study mode:
on
1
Intro
2
Overview
3
First Attack
4
Travel Advisory
5
Router Access Control Lists
6
Incident Response
7
Enhanced Monitoring
8
Proof of Concept
9
Open Source
10
Honey Pots
11
Geek Card
12
Audit
13
Collective Intelligence Framework
14
Honeypots
15
Proof Concept
16
Native Tools
17
Identifying new attack profiles
18
Identifying maps of interest
19
Who would attack us
20
Why are we targets
21
What I accomplished
22
Business enabler
23
Thanks
Description:
Explore the development of a threat intelligence program using open source tools in this 52-minute conference talk from DerbyCon 4. Dive into topics such as incident response, enhanced monitoring, and honeypots. Learn about the Collective Intelligence Framework and how to identify new attack profiles. Discover the importance of understanding potential attackers, their motivations, and targets. Gain insights on implementing router access control lists, conducting audits, and leveraging native tools. Understand how a robust threat intelligence program can serve as a business enabler and help protect your organization from emerging cyber threats.

Open Source Threat Intelligence - Developing a Threat Intelligence Program Using Open Source Tool

Add to list
0:00 / 0:00