All current Conference Talks courses in 2024
731 Courses
Evaluating Commercial Cyber Threat Intelligence
Explore methods for assessing and leveraging commercial cyber threat intelligence to enhance organizational security posture and decision-making processes.
Strengthening Your Security Program
Enhance your security program with log analytics, intelligence, and strategic planning. Learn to build relationships and allocate training budgets effectively.
Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise
Practical guide to deploying honeynets for active defense within enterprises, covering various honeypot types, use cases, and monitoring techniques for enhanced threat intelligence.
Rebuilding and Transforming an Information Security Function
Explore strategies for rebuilding and transforming information security functions, covering regulatory perspectives, strategic planning, and key principles for effective implementation.
Applied Detection and Analysis Using Flow Data
Explore network flow data analysis techniques for enhanced threat detection and incident response in cybersecurity environments.
Lessons Learned from Building and Running MHN - the World's Largest Crowdsourced Honeynet
Explore insights from managing the world's largest crowdsourced honeynet, covering architecture, community growth, and global attack patterns in cybersecurity.
Actionable Threat Intelligence - ISIS and the SuperBall
Explore actionable threat intelligence strategies, from building threat models to implementing preemptive and reactive measures, enhancing cybersecurity through practical insights and methodologies.
Using Evernote as a Threat Intelligence Management Platform
Learn to leverage Evernote for effective threat intelligence management, enhancing your cybersecurity practices with organized data collection, analysis, and collaboration tools.
Running Away from Security - Web App Vulnerabilities and OSINT Collide
Explore the intersection of web app vulnerabilities and OSINT techniques, uncovering potential security risks and learning effective mitigation strategies.
Using Evernote as a Threat Intelligence Management Platform - Part 2
Explore using Evernote for threat intelligence management, covering requirements, sources, automation, sharing, and case tracking in cybersecurity operations.