Главная
Study mode:
on
1
Introduction
2
Most Useful Forms
3
Requirements
4
Sources
5
Processing
6
Analysis
7
dissemination
8
tools used
9
Moving forward
10
Megan Gooch
11
Agenda Slide
12
Survey Question 16
13
Survey Question 23
14
Survey Question 24
15
Wrap Up
16
Value of CTI
17
Collect the right feeds
18
Security Operations Center Survey
19
Device Data Example
Description:
Explore the evolving landscape of cyber threat intelligence in this comprehensive 2-hour webinar from Dragos: ICS Cybersecurity. Delve into the key findings of the SANS 2022 Cyber Threat Intelligence Survey, examining how CTI professionals adapted to global shifts in work environments and threat landscapes. Gain insights on the changing needs of cyber threat intelligence due to remote work practices, the role of CTI in addressing the rise of ransomware, and its importance in preparing organizations for unpredictable, high-impact events. Learn about the most useful forms of CTI, requirements gathering, source selection, processing techniques, analysis methods, and dissemination strategies. Discover the tools used by CTI professionals and explore future trends in the field. Benefit from expert discussions on the value of CTI, best practices for collecting the right data feeds, and real-world examples of device data analysis in security operations centers.

SANS 2022 Cyber Threat Intelligence Survey - Key Findings and Adaptations

Dragos: ICS Cybersecurity
Add to list
0:00 / 0:00