All current Conference Talks courses in 2024
731 Courses
Deploying Honeypots to Gather Actionable Threat Intelligence
Explore deploying high-interaction honeypots for gathering actionable threat intelligence, including setup considerations, virtualization challenges, and cloud implementation strategies.
Nepenthes Netpens With Less Pain
Learn to set up and manage Nepenthes honeypots efficiently, enhancing your network security skills and threat intelligence capabilities.
Building a Threat Intelligence Program
Explore threat intelligence program development, addressing misconceptions, leveraging open-source tools, and enhancing operations while navigating challenges in cybersecurity.
Adaptive Monitoring and Detection for Today's Landscape
Explore adaptive monitoring and detection strategies for modern cybersecurity landscapes, focusing on effective incident response and threat intelligence implementation.
Threat Intelligence - A Program Strategy Approach
Explore threat intelligence program strategy, covering research, business case, components, and maturity models. Learn to analyze solutions, mitigate risks, and develop effective processes.
Cymon New Cyber Monitoring Tool
Explore Cymon, a new cyber monitoring tool for threat intelligence, featuring event tracking, visualizations, and machine learning capabilities for enhanced cybersecurity.
How Skynet Started as a Context Graph
Explore how context graphs can evolve into advanced AI systems, drawing parallels to Skynet's fictional origin and real-world implications for cybersecurity and data analysis.
TAPIOCA Automated Processing for IOC Analysis
Explore automated processing for IOC analysis with TAPIOCA, covering data pivoting, OPSEC, atomic indicators, and tools for efficient threat intelligence gathering and analysis.
ZOMG It's OSINT Heaven
Explore advanced OSINT techniques and tools for gathering intelligence from open sources, enhancing your cybersecurity and investigative skills.
Adversary Intelligence from Conflict to Consensus
Explore adversary intelligence strategies, transitioning from conflict to consensus, with insights on effective threat analysis and collaborative security approaches.