Главная
Study mode:
on
1
Introduction
2
What is cyber threat intelligence
3
Building detections
4
Commandline arguments
5
Enable veracity
6
Spunk
7
Event Changes
8
caldera
9
Summary
10
Contact Information
Description:
Explore a comprehensive conference talk on operationalizing cyber intelligence to enhance security and improve threat detection. Learn about the fundamentals of cyber threat intelligence, techniques for building effective detections, and the importance of command-line arguments. Discover methods to enable veracity in your security operations, leverage Splunk for enhanced monitoring, and understand event changes. Gain insights into the Caldera framework and its applications in cybersecurity. Conclude with a summary of key takeaways and access contact information for further inquiries.

ATT&CKing Your Adversaries - Operationalizing Cyber Intelligence in Your Own Environment for Better Sleep and a Safer Tomorrow

BSidesLV
Add to list