BSides DC 2014 - Diamond Model for Intrusion Analysis: What You Need to Know
Any good Threat Intelligence analyst’s overarching goal is to provide actionable intelligence to aid in the defense of the network and larger business processes of the organization. To do this, the analyst needs to correlate data from several sources both internal and external, make associations between disparate events, recommend or take courses of action from their analysis, and likely write reports for management describing the nature and intent of the threats they are dealing with.
The Diamond Model for Intrusion Analysis lays a foundation for analysts to begin to address these challenges by applying scientific rigor to what has long been considered an art. It accurately details the fundamental aspects of all malicious activity as well as the core analytic concepts used to discover, develop, track, group, and ultimately counter both the activity and the adversary.
Learn how to implement the Diamond Model into your organization's threat intelligence processes and workflow to be able to better understand and defend against the most sophisticated threats.
Andy Pendergast (Product Director at Cyber Squared Inc.)
Andy is a community respected analyst, innovator, and thought leader. He has over 15 years of experience working in the Intelligence and Computer Network Defense Communities from within the U.S. DoD and Fortune 500 companies. He brings his passion for intelligence-led defense to his role as Product Director for ThreatConnect™. He is a co-author of "The Diamond Model of Intrusion Analysis". Andy is a veteran of the U.S. Army, holds a Diploma in Chinese Mandarin and a Bachelor of Science from Excelsior University.
Видео BSides DC 2014 - Diamond Model for Intrusion Analysis: What You Need to Know канала BSides DC
The Diamond Model for Intrusion Analysis lays a foundation for analysts to begin to address these challenges by applying scientific rigor to what has long been considered an art. It accurately details the fundamental aspects of all malicious activity as well as the core analytic concepts used to discover, develop, track, group, and ultimately counter both the activity and the adversary.
Learn how to implement the Diamond Model into your organization's threat intelligence processes and workflow to be able to better understand and defend against the most sophisticated threats.
Andy Pendergast (Product Director at Cyber Squared Inc.)
Andy is a community respected analyst, innovator, and thought leader. He has over 15 years of experience working in the Intelligence and Computer Network Defense Communities from within the U.S. DoD and Fortune 500 companies. He brings his passion for intelligence-led defense to his role as Product Director for ThreatConnect™. He is a co-author of "The Diamond Model of Intrusion Analysis". Andy is a veteran of the U.S. Army, holds a Diploma in Chinese Mandarin and a Bachelor of Science from Excelsior University.
Видео BSides DC 2014 - Diamond Model for Intrusion Analysis: What You Need to Know канала BSides DC
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![The Diamond Model: An Analyst's Best Friend](https://i.ytimg.com/vi/TE6UY3u9aEY/default.jpg)
![BSides DC 2019 - Hands-on Writing Malware in Go](https://i.ytimg.com/vi/2cGsTEkDkT8/default.jpg)
![BSides DC 2019 - Signing your code the easy way](https://i.ytimg.com/vi/nUXpDialA6o/default.jpg)
![BSides DC 2019 - We Do In The Shadows: "Going Dark" With Consumer Electronics](https://i.ytimg.com/vi/q-663aGnnJo/default.jpg)
![Diamond Model of Intrusion Analysis - An Overview](https://i.ytimg.com/vi/3PoQLOJr5WI/default.jpg)
![BSides DC 2019 - 0-day Research Disassembled](https://i.ytimg.com/vi/NPIq2lOtaEI/default.jpg)
![PORTER'S DIAMOND MODEL OF COMPETITIVE ADVANTAGE](https://i.ytimg.com/vi/pTLdef8y98c/default.jpg)
![Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles](https://i.ytimg.com/vi/0QHUS8SNTNc/default.jpg)
![BSides DC 2019 - Offensive PCAP](https://i.ytimg.com/vi/Sig1QTev6MY/default.jpg)
![BSides DC 2019 - SCADA: What the next Stuxnet will look like and how to prevent it](https://i.ytimg.com/vi/JZaESWpzu1E/default.jpg)
![CTI Framework for Beginners](https://i.ytimg.com/vi/NpAMJxoP--o/default.jpg)
![BSides DC 2019 - Social Media OSINT Without the Indigestion](https://i.ytimg.com/vi/QqAkDbs_-MM/default.jpg)
![BSides DC 2019 - Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK](https://i.ytimg.com/vi/bGN3jak_6bE/default.jpg)
![BSides DC 2019 - No IOUs with IOT](https://i.ytimg.com/vi/yPMdUcMshz8/default.jpg)
![BSides DC 2019 - Are your Network Devices Good or Evil? Introducing CHOX](https://i.ytimg.com/vi/opwsG_TiKH0/default.jpg)
![Network Analysis with Python](https://i.ytimg.com/vi/oA7QhYOhW_0/default.jpg)
![BSidesAugusta 2017 - Track1: Machine Learning Fueled Cyber Threat Hunting by Tim Crothers](https://i.ytimg.com/vi/c-c-IQ5pFXw/default.jpg)
![BSides DC 2019 - Malware Behavior Catalog](https://i.ytimg.com/vi/KY8Ty-0sdVU/default.jpg)
![BSides DC 2019 - Looking to the Past to Better Understand Threat Intelligence](https://i.ytimg.com/vi/sSzz_BggYHQ/default.jpg)
![BSides DC 2019 - Breaking Through the Boundaries of Cyber Security Job Search Challenges](https://i.ytimg.com/vi/Rl6MA7TPqRI/default.jpg)