Главная
Study mode:
on
1
Introduction
2
Disclaimer
3
How I Started
4
Threat Intel Market
5
Requirements
6
The Secret Weapon
7
What is Threat Intelligence
8
Threat Intel Sharing
9
Case Tracking
10
Open Source Tools
11
OSN Sources
12
Automating
13
Sharing
14
Tagging
15
Notes
16
Search
17
Future Work
18
Summary
19
Contact
Description:
Learn how to leverage Evernote as a powerful threat intelligence management platform in this comprehensive conference talk. Explore the evolving threat intelligence market, understand key requirements, and discover the secret weapon for effective intelligence gathering. Delve into the fundamentals of threat intelligence, sharing methodologies, and case tracking techniques. Gain insights into utilizing open-source tools and OSN sources for enhanced threat detection. Master the art of automating processes, efficient sharing practices, and implementing effective tagging and note-taking strategies. Discover advanced search techniques and explore future developments in the field. Conclude with a summary of key takeaways and establish valuable connections for continued learning and collaboration in the realm of cybersecurity threat intelligence.

Using Evernote as a Threat Intelligence Management Platform - Part 2

Add to list
0:00 / 0:00