The role of threat intelligence is clearly growing given the market trends of vendors and the cybersecurity industry in general. Many organizations are still struggling to understand cyber adversaries and their actions however, with many of them focusing on shallow and atomic indicators of compromise. By tracking adversaries’ infrastructure, malware, and behavior, threat researchers can produce enduring detection and assist with adversary emulation. This talk will focus on how to track adversaries, suggested skills and tools for analysts, and provide examples of actionable intelligence that results from collecting this information.
- Understanding of some of the latest high profile threat actor tactics, techniques, and procedures (TTPs)
- How to conduct research on adversary infrastructure and malware.
- Suggestions for prerequisites and detection criteria as part of being a successful threat intelligence program
- Additional resources, tools, and skills most of which are open source and freely available
Email email@example.com to RSVP today!
ELIGIBILITY: This webinar is open to RH-ISAC Core members only. Ineligible registrants will have their registration canceled. To learn about eligibility, visit rhisac.org/membership