Creating REAL Threat Intelligence with Evernote

Creating REAL Threat Intelligence with Evernote

BruCON Security Conference via YouTube Direct link

Introduction

1 of 30

1 of 30

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Creating REAL Threat Intelligence with Evernote

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Testing
  3. 3 Disclaimer
  4. 4 What is Threat Intelligence
  5. 5 Lessons Learned
  6. 6 Build Before You Buy
  7. 7 The Problem
  8. 8 Specific Requirements
  9. 9 Background
  10. 10 Google Reader
  11. 11 Datadriven feeds
  12. 12 Task management
  13. 13 Secret weapon
  14. 14 GTD methodology
  15. 15 Threat Intel market
  16. 16 The Pyramid of Pain
  17. 17 The Circle
  18. 18 This is your organization
  19. 19 Take it in house
  20. 20 Evernote
  21. 21 Open Source Intel
  22. 22 Sources
  23. 23 Getting Data into Evernote
  24. 24 Recipe Title
  25. 25 Information Sharing
  26. 26 Search
  27. 27 Requirements
  28. 28 Future Ideas
  29. 29 Conclusion
  30. 30 Managing Quality

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.