Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016
Threat actors are not magic and there is not an unlimited, unique list of threats for every organization. Enterprises face similar threats from similar threat sources and threat actors – so why does every organization need to perform completely unique risk assessments and prioritized control decisions? This presentation will show how specific, community-driven threat models can be used to prioritize an organization’s defenses – without all the confusion. In this
presentation James Tarala will present a new, open, community-driven threat model that can be used by any industry to evaluate the risk that faces them. Then he will show how to practically
use this model to prioritize enterprise defense and map to existing compliance requirements facing organizations today. Whether you are in the Department of Defense or work for a small mom-and-pop retailer, you will be able to use this model to specifically determine a prioritized defense for your organization.
James Tarala, Principal Consultant, Enclave Security; Senior Instructor, SANS Institute
James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor for many SANS auditing and security courses. As a consultant, he has spent the past few years architecting large enterprise IT security and infrastructure architectures, specifically working with many Microsoft-based directory services, e-mail, terminal services, and wireless technologies. He has also spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues, and he often performs independent security audits and assists internal audit groups in developing their internal audit programs. James completed his undergraduate studies at Philadelphia Biblical University and his graduate work at the University of Maryland. He holds numerous professional certifications.
ATTEND THE 2017 THREAT HUNTING SUMMIT: http://dfir.to/ThreatHunting2017
SANS THREAT HUNTING AND INCIDENT RESPONSE COURSES
FOR508: Digital Forensics, Incident Response, & Threat Hunting: http://sans.org/FOR508
FOR572: Network Forensics: http://sans.org/FOR572
FOR578: Cyber Threat Intelligence: http://sans.org/FOR578
Видео Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016 канала SANS Digital Forensics and Incident Response
presentation James Tarala will present a new, open, community-driven threat model that can be used by any industry to evaluate the risk that faces them. Then he will show how to practically
use this model to prioritize enterprise defense and map to existing compliance requirements facing organizations today. Whether you are in the Department of Defense or work for a small mom-and-pop retailer, you will be able to use this model to specifically determine a prioritized defense for your organization.
James Tarala, Principal Consultant, Enclave Security; Senior Instructor, SANS Institute
James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor for many SANS auditing and security courses. As a consultant, he has spent the past few years architecting large enterprise IT security and infrastructure architectures, specifically working with many Microsoft-based directory services, e-mail, terminal services, and wireless technologies. He has also spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues, and he often performs independent security audits and assists internal audit groups in developing their internal audit programs. James completed his undergraduate studies at Philadelphia Biblical University and his graduate work at the University of Maryland. He holds numerous professional certifications.
ATTEND THE 2017 THREAT HUNTING SUMMIT: http://dfir.to/ThreatHunting2017
SANS THREAT HUNTING AND INCIDENT RESPONSE COURSES
FOR508: Digital Forensics, Incident Response, & Threat Hunting: http://sans.org/FOR508
FOR572: Network Forensics: http://sans.org/FOR572
FOR578: Cyber Threat Intelligence: http://sans.org/FOR578
Видео Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016 канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
13 августа 2016 г. 10:12:19
00:37:46
Другие видео канала
The Cycle of Cyber Threat IntelligenceTales from the Network Threat Hunting Trenches & AI Hunter DemoQuantify Your Hunt: Not Your Parents’ Red Team - SANS Threat Hunting Summit 2018Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017Leveraging Curiosity to Enhance Analytic Technique - SANS Cyber Threat Intelligence Summit 2018Open Source Intelligence 101Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018Death to the IOC: What's Next in Threat IntelligenceHow To Use Threat IntelligenceFind_Evil - Threat Hunting | SANS@MIC TalkOSINT: Sharpen Your Cyber Skills With Open-source IntelligenceVulnerability Management: You're doing it wrongWhat Are STIX/TAXII?Owning a Building: Exploiting Access Control and Facility Management Systems by Billy RiosFacets and realities of cyber security threats | Alexandru Catalin Cosoi | TEDxBucharestACM Webcast: Network Threat Hunting RunbookSirenJack: Cracking a 'Secure' Emergency Warning Siren SystemRevoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using ScienceThe Dark Arts of Social Engineering – SANS Security Awareness Summit 2018