Главная
Study mode:
on
1
Introduction
2
Security Automation Market
3
Threat Detection Automation
4
Vulnerability Scanner Data
5
Automating Vulnerability Prioritization
6
Asset Management Database
7
Set the Rules
8
Scan Data
9
Deploy Patch
10
Automation Workflow
11
Security Incident Response
12
Research and Automation
13
High Profile Vulnerability Planning
14
Vulnerability Scanner
15
Shellshock Example
16
Security Analyst Workflow
17
Data Enrichment Activities
18
Phishing Attacks
19
Phishing Attack Example
20
More Automation
21
Threat Intel Sharing
22
Operationalizing Threat Intel
23
Duplicative Information
24
Is it real
25
Circle of Trust
26
Anonymous
27
Timely
28
Automation
29
Prioritize vulnerability patching
30
Hiring talent
31
Questions
Description:
Explore a 49-minute conference talk from RSA Conference that delves into the critical role of threat intelligence sharing and automation in combating cyber attackers. Learn how security teams can leverage collective expertise to identify potential threats early, minimizing damage through effective information sharing. Discover the benefits and challenges of real-time threat intelligence sharing, gain insights from practical use cases demonstrating the value of automation and orchestration, and explore opportunities for security teams to engage with relevant groups. Examine topics such as security automation markets, threat detection automation, vulnerability prioritization, asset management, security incident response, and operationalizing threat intelligence. Gain practical knowledge on implementing automation workflows, handling high-profile vulnerabilities, and addressing phishing attacks. Understand the importance of creating a trusted circle for sharing information, ensuring anonymity and timeliness in threat intelligence exchange, and leveraging automation to prioritize vulnerability patching effectively. Read more

How Threat Intelligence Sharing and Automation Wins the War against Attackers

RSA Conference
Add to list