Threat Intelligence At Microsoft: A Look Inside - Cyber Threat Intelligence Summit 2017
Threat Intelligence At Microsoft: A Look Inside
Register for the 2018 Cyber Threat Intelligence Summit: http://www.sans.org/u/wOQ
Sergio Caltagirone will dive deep into the operations, processes, and tools of the threat intelligence practice at one of the largest companies in the world, Microsoft. He will share how they do what they do to protect billions of customers worldwide while at the same time
protecting their own multi-national organization from threats. This presentation will include their core philosophies which influence decisions around threat intelligence and some lessons and
perspective for others building and managing their own threat intelligence practice.
Sergio Caltagirone (@cnoanalysis), Director – Threat Intelligence & Analystics, Dragos, Inc.
Видео Threat Intelligence At Microsoft: A Look Inside - Cyber Threat Intelligence Summit 2017 канала SANS Digital Forensics and Incident Response
Register for the 2018 Cyber Threat Intelligence Summit: http://www.sans.org/u/wOQ
Sergio Caltagirone will dive deep into the operations, processes, and tools of the threat intelligence practice at one of the largest companies in the world, Microsoft. He will share how they do what they do to protect billions of customers worldwide while at the same time
protecting their own multi-national organization from threats. This presentation will include their core philosophies which influence decisions around threat intelligence and some lessons and
perspective for others building and managing their own threat intelligence practice.
Sergio Caltagirone (@cnoanalysis), Director – Threat Intelligence & Analystics, Dragos, Inc.
Видео Threat Intelligence At Microsoft: A Look Inside - Cyber Threat Intelligence Summit 2017 канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
2 марта 2017 г. 5:45:54
00:22:16
Другие видео канала
Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 20161. Introduction, Threat ModelsFacets and realities of cyber security threats | Alexandru Catalin Cosoi | TEDxBucharestBuilding a billion-dollar cybersecurity company | Cyber Work PodcastThe Cycle of Cyber Threat IntelligenceThreat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020How to Use and Create Threat Intelligence in an Office 365 World - SANS CTI Summit 20195 Entry Level Cyber Jobs You Need to Know AboutWhat Are the Differences Between Threat Hunting and Incident ResponseA New Theory of Human Intelligence | Scott Barry Kaufman | TEDxZumbroRiverThe Story of Microsoft - How a Computer Club Took Over The WorldThreat Hunting with Network Flow - SANS Threat Hunting Summit 2017How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017Cyber Threat Intelligence Explained and How Install MISP Threat Intelligence Platform with DockerA Planned Methodology for Forensically Sound IR in Office 365 - SANS DFIR Summit 2018Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017Jumping Air Gaps – SANS ICS Summit 2018Cyber Security Interview Questions And Answers | Cyber Security Interview Preparation | SimplilearnTop 10 Cyber Threat Intelligence ToolsAlphaBay Market: Lessons From Underground Intelligence Analysis - SANS CTI Summit 2018