Through the Eyes of the Adversary: How to Build a Threat Intel Program
Presenters:
Scott Jarkoff, Lead, Strategic Threat Advisory Group, Asia-Pacific & Japan, CrowdStrike
Jason Rivera, Director, Strategic Threat Advisory Group, CrowdStrike
Many threat intelligence programs lack the necessary direction, purpose and focus needed to combat advanced cyberthreat adversaries, and therefore often struggle to attain relevancy. This session will remedy that issue by empowering attendees with the ability to build their own threat intelligence programs based upon the attacker’s point of view.
https://www.rsaconference.com/apj/agenda/through-the-eyes-of-the-adversary-how-to-build-a-threat-intel-program
Видео Through the Eyes of the Adversary: How to Build a Threat Intel Program канала RSA Conference
Scott Jarkoff, Lead, Strategic Threat Advisory Group, Asia-Pacific & Japan, CrowdStrike
Jason Rivera, Director, Strategic Threat Advisory Group, CrowdStrike
Many threat intelligence programs lack the necessary direction, purpose and focus needed to combat advanced cyberthreat adversaries, and therefore often struggle to attain relevancy. This session will remedy that issue by empowering attendees with the ability to build their own threat intelligence programs based upon the attacker’s point of view.
https://www.rsaconference.com/apj/agenda/through-the-eyes-of-the-adversary-how-to-build-a-threat-intel-program
Видео Through the Eyes of the Adversary: How to Build a Threat Intel Program канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![](https://i.ytimg.com/vi/qtoHcO-7MOg/default.jpg)
![U.S. Fleet Cyber Command/U.S. 10th Fleet - Now 10 Years Old](https://i.ytimg.com/vi/nAexLrLhezc/default.jpg)
![Insights from NSA’s Cybersecurity Threat Operations Center](https://i.ytimg.com/vi/C7hHSdp6JhI/default.jpg)
![The Cryptographers’ Panel 2018](https://i.ytimg.com/vi/-fpNaapuPGY/default.jpg)
![Louder Than Words](https://i.ytimg.com/vi/7gvdGZnvEA4/default.jpg)
![The Five Most Dangerous New Attack Techniques and How to Counter Them](https://i.ytimg.com/vi/sibeN4U1fOg/default.jpg)
![A View from the Front Lines of Cybersecurity](https://i.ytimg.com/vi/7EH7ehAY3_w/default.jpg)
![Navy Cyber: The 5th Operational Domain (lores)](https://i.ytimg.com/vi/kaJJfZ_1MHo/default.jpg)
![The Fallacy of the "Zero-Trust Network"](https://i.ytimg.com/vi/tFrbt9s4Fns/default.jpg)
![Machine Learning and the Cloud: Disrupting Threat Detection and Prevention](https://i.ytimg.com/vi/fRklX97iGIw/default.jpg)
![Webcast: The Importance of SBOMs](https://i.ytimg.com/vi/w3xBULnNRIw/default.jpg)
![Hacking Exposed NextGen](https://i.ytimg.com/vi/QZ6mEq6DQOo/default.jpg)
![Reality Under Attack: Just How Serious Is the Deep Fake Threat?](https://i.ytimg.com/vi/IFXLhoUNrw8/default.jpg)
![Intelligence Preparation of the Cyber Environment - SANS Cyber Threat Intelligence Summit 2018](https://i.ytimg.com/vi/3bXr-CF9NBI/default.jpg)
![The Five Most Dangerous New Attack Techniques, and What's Coming Next](https://i.ytimg.com/vi/aoIPIIB4xlA/default.jpg)
![The Six Most Dangerous New Attack Techniques and What's Coming Next](https://i.ytimg.com/vi/3fy8YI-Xf-g/default.jpg)
![Three Things the Security Industry Isn’t Talking About (but Should Be)](https://i.ytimg.com/vi/L-7I6cshYz4/default.jpg)
![Beyond Stuxnet: State of the Art in Cyberwarfare and Weapons](https://i.ytimg.com/vi/S268jEi0ZkQ/default.jpg)
![How to Get Promoted: Developing Metrics to Show How Threat Intel Works - SANS CTI Summit 2019](https://i.ytimg.com/vi/-d38C3992aQ/default.jpg)
![IoT Ecosystems: An Adversary's Perspective](https://i.ytimg.com/vi/rkXaS6gbIrU/default.jpg)