Главная
Study mode:
on
1
Introduction
2
Who am I
3
Trap modeling
4
Threat intelligence sources
5
What is MISRA
6
MISRA Matrix
7
Identifying threat actors
8
Identifying draft actors
9
External threat intelligence sources
10
Internal threat intelligence sources
11
MicroAttack Navigator
12
Identifying detection sources
13
Detect
14
Data Sources
15
List of Detection Sources
16
Example Exercise
17
Navigator Visualization
18
Customer Example
19
Remarks
20
Outro
Description:
Explore a comprehensive conference talk from DefCamp 2021 on leveraging threat intelligence to prioritize detection sources in cybersecurity. Delve into trap modeling, MITRE ATT&CK framework, and the MISRA Matrix for identifying threat actors. Learn about external and internal threat intelligence sources, and how to use the MicroAttack Navigator for visualization. Gain practical insights through an example exercise and a real customer case study. Enhance your ability to identify and prioritize detection sources in information security, drawing from the expertise shared at one of Central and Eastern Europe's most significant hacking and InfoSec conferences.

Leveraging Threat Intelligence in the Prioritization of Detection Sources - DefCamp - 2021

DefCamp
Add to list