Главная
Study mode:
on
1
Intro
2
ADVERSARIES ARE BECOMING MORE CAPABLE WHILE... DEFENDERS ARE STRUGGLING TO STOP THEM
3
THREAT INTELLIGENCE IS ABOUT UNDERSTANDING THE RELATIONSHIP BETWEEN OURSELVES & THE ADVERSARY
4
THE OUTCOME OF VIRTUALLY ALL CONFUCTS IS DITERMINED AS A FUNCTION OF THREE CORE COMPONENTS
5
BEST PRACTICES: TACTICAL INTELLIGENCE
6
TACTICAL INTELLIGENCE HIGHLIGHT
7
BEST PRACTICES OPERATIONAL INTELLIGENCE
8
BEST PRACTICES: STRATEGIC INTELLIGENCE
9
THREAT INTELLIGENCE WHAT USE CASES ARE RELEVANT TO YOU?
10
INVESTIGATIONS WITHOUT AUTOMATION ARE BOTH TIME CONSUMING AND COMPLICATED
11
FALCON X ENDPOINT INTELLIGENCE AUTOMATION WORKFLOW
12
FALCON X IS THE FIRST AND ONLY INTEL CAPABILITY TO AUTOMATICALLY SYNTHESIZE ENDPOINT DETECTIONS WITH THREAT INTELLIGENCE
13
FALCON X THREAT INTELLIGENCE PRODUCT
14
FALCON X STANDARD
15
FALCON X PREMIUM
16
FALCON X ELITE
17
FALCON X DEDICATED ANALYST PROGRAM
18
FALCON X CAPABILITIES
19
LOOKING FOR MORE INFORMATION?
Description:
Explore the critical role of cyber threat intelligence in modern cybersecurity strategies during this 46-minute conference talk from Disclosure 2020. Gain insights from CrowdStrike's Director of Strategic Threat Advisors Group, Jason Rivera, as he demystifies threat intelligence solutions and their practical applications. Learn how to effectively leverage threat intelligence across your organization, from security operations to executive leadership. Discover best practices for tactical, operational, and strategic intelligence, and understand the relationship between defenders and adversaries. Examine relevant use cases, the importance of automation in investigations, and the capabilities of CrowdStrike's Falcon X intelligence products. Equip yourself with the knowledge to proactively respond to and pre-empt advanced cyber threats in today's evolving security landscape.

Cyber Threat Intelligence Demystified - Leveraging Intelligence for Effective Cybersecurity

Okta
Add to list