I NEED WHAT? Collect & fuse structured and unstructured information from various
7
AUTOMATION FOR ALL ROLES OF BUSINESS
8
THREAT INTELLIGENCE PLATFORM
9
MAKING YOUR DATA BIGGER
10
MACHINE READABLE THREAT INTELLIGENCE
11
SECURITY PROCESSES DRIVEN BY INTELLIGENCE
12
DIAMOND MODEL
13
CURRENT USAGE
14
DIAMOND 101: EVENTS, EDGES, AND META FEATURES
15
DIAMOND 101: PIVOTING SCENARIO
16
DIAMOND 101: ACTIVITY THREADS
17
DIAMOND 101: EXTENDED DIAMOND
18
DEFENSE CONTRACTOR USE-CASE
19
GOVERNMENT USE-CASE
20
FORTUNE 100 USE-CASE
Description:
Explore a comprehensive conference talk from BSidesLV 2014 that delves into innovative approaches for enhancing threat intelligence. Learn about the importance of data-driven problem-solving, automation in business roles, and the implementation of threat intelligence platforms. Discover the Diamond Model for cyber threat intelligence, including its core components, pivoting scenarios, and extended applications. Gain insights into real-world use cases from defense contractors, government agencies, and Fortune 100 companies. Understand how to collect and fuse structured and unstructured information from various sources, create machine-readable threat intelligence, and drive security processes with intelligent data analysis.