What You Need to Know Before
You Start
Starts 9 June 2025 03:34
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
53 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore threat intelligence program development, addressing misconceptions, leveraging open-source tools, and enhancing operations while navigating challenges in cybersecurity.
Syllabus
- Introduction to Threat Intelligence
- Building the Foundation of a Threat Intelligence Program
- Threat Intelligence Data Sources
- Tools and Technologies
- Analyzing and Evaluating Threat Data
- Operationalizing Threat Intelligence
- Navigating Challenges in Threat Intelligence
- Case Studies and Real-World Applications
- Conclusion and Next Steps
Defining Threat Intelligence
The Importance of Threat Intelligence in Cybersecurity
Common Misconceptions
Identifying Program Objectives
Understanding Stakeholder Needs
Developing Key Performance Indicators (KPIs)
Leveraging Open-Source Intelligence (OSINT)
Utilizing Commercial Threat Intelligence Feeds
Collaborating with Industry Partners and ISACs
Overview of Threat Intelligence Platforms (TIPs)
Implementing Open-Source Tools
Integration with Security Information and Event Management (SIEM) Systems
Threat Research and Data Collection Techniques
Data Normalization and Contextualization
Developing Threat Models and Personas
Incident Response and Threat Intelligence
Threat Intelligence Sharing and Collaboration
Enhancing Security Operations with Threat Intelligence
Addressing Data Privacy and Legal Concerns
Overcoming Alert Fatigue and Information Overload
Continuous Evaluation and Program Improvement
Analyzing Successful Threat Intelligence Programs
Lessons Learned from Notable Cybersecurity Incidents
Building a Roadmap for Threat Intelligence Maturity
Future Trends in Threat Intelligence
Continuing Education and Professional Development Resources
Subjects
Conference Talks