Главная
Study mode:
on
1
Introduction
2
What is Intelligence
3
Network Perimeter Boundary
4
Capabilities Brief
5
Specified Tasks
6
Intelligence Cycle
7
Hip Pocket Training
8
The Intelligence Cycle
9
Analyze the raw data
10
Develop the picture dissemination
11
Operational Environment
12
Intelligence
13
Persistence
14
Internal Threat Intelligence
15
RapidDissemination
16
Threat Intelligence
17
Contextual Threat Intelligence
18
The Hunt
19
Elk Stack
20
What is a Data Scientist
21
DataDriven Security
22
Showdown
23
Data Science Program
Description:
Explore a comprehensive conference talk on building data science capabilities for threat intelligence in cybersecurity hunt teams. Delve into the intelligence cycle, operational environment, and contextual threat intelligence concepts. Learn about the role of data scientists in security, the ELK stack, and implementing a data-driven security approach. Gain insights on integrating intelligence gathering, analysis, and dissemination processes to enhance threat hunting capabilities and improve overall cybersecurity posture.

Contextual Threat Intelligence - Building a Data Science Capability into the Hunt Team

Add to list