Главная
Study mode:
on
1
Introduction
2
Building a Threat Model
3
Assets
4
Attackers
5
Asset Management
6
Collecting Intelligence
7
Threat Actors
8
General Threat Intelligence
9
How
10
Threat Intelligence Pyramid
11
Preemptive Threat Intelligence
12
Reactive Threat Intelligence
13
Ongoing Threat Intelligence
14
Actionable
15
preemptive incident response
16
postmortem analysis
17
counter intelligence
18
for intelligence
19
feedback loop
20
metrics
21
summary
22
limit
23
cycle
Description:
Explore a comprehensive conference talk on actionable threat intelligence, focusing on ISIS and the SuperBall. Learn how to build effective threat models by identifying assets and attackers, manage assets, collect intelligence, and understand threat actors. Dive into the Threat Intelligence Pyramid and discover preemptive, reactive, and ongoing threat intelligence strategies. Gain insights on implementing actionable intelligence through preemptive incident response, postmortem analysis, and counter-intelligence techniques. Understand the importance of feedback loops and metrics in threat intelligence. Conclude with a summary of key concepts and limitations in the intelligence cycle.

Actionable Threat Intelligence - ISIS and the SuperBall

Add to list