Posted on
in Presentations
Ingesting data is easy. Turning it into intelligence is hard. Curating your own threat intel can be easy. But is sharing it risky? At a certain stage of maturity, every SOC will probably consider if they need a threat intel program. In this talk you will hear from an incident responder turned hunter turned intel manager as he talks through how threat intel helped mature his security posture.
Learning Objectives:
1: Understand what level of threat intelligence you need.
2: Learn how to ingest data and convert it to threat intelligence.
3: Discover what to do with threat intelligence once you have it.
Pre-Requisites:
General security operations centre / blue team knowledge.
Learning Objectives:
1: Understand what level of threat intelligence you need.
2: Learn how to ingest data and convert it to threat intelligence.
3: Discover what to do with threat intelligence once you have it.
Pre-Requisites:
General security operations centre / blue team knowledge.
Share With Your Community