Главная
Study mode:
on
1
Intro
2
Security Intelligence
3
Demonstrating Value
4
Operationalizing
5
Real Time
6
Internal Sources
7
Known Assets
8
Risk Register
9
Internal Picture
10
Pastebin
11
Security Industry
12
Business by Business
13
Information Sources
14
Threat Intel
15
Intelligence Acquisition Models
16
External Issues
17
Internal Relevance
18
Acquisition Methods
19
Budget Matters
20
Deduplication
21
Analyze Refine
22
Structured Unstructured Data
23
Hadoop MapReduce
24
Too Much Data
25
Prioritize
26
Decision Making
27
Scoring Process
28
Threat Index
29
Reacting
30
Analysis to Action
31
Response proportional to threat
32
Strategy
33
Continuous Improvement
Description:
Explore operationalizing security intelligence in enterprise environments through this DerbyCon 3.0 conference talk. Delve into demonstrating value, real-time implementation, and leveraging internal sources like known assets and risk registers. Examine external information sources, threat intelligence acquisition models, and budget considerations. Learn about deduplication, data analysis techniques using Hadoop and MapReduce, and effective prioritization methods. Discover how to transform analysis into action with proportional threat responses and develop a strategy for continuous improvement in enterprise security.

Operationalizing Security Intelligence in the Enterprise

Add to list