Synergizing Threat-Informed Defense

Synergizing Threat-Informed Defense

Conf42 via YouTube Direct link

example - validating detections

14 of 20

14 of 20

example - validating detections

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Synergizing Threat-Informed Defense

Automatically move to the next video in the Classroom when playback concludes

  1. 1 intro
  2. 2 preamble
  3. 3 about me
  4. 4 agenda
  5. 5 cybersecurity: low signals to noise ratio
  6. 6 pillar 01: defensive measures
  7. 7 pillar 02: cyber threat intelligence
  8. 8 pillar 03: testing & evaluation
  9. 9 why adversary emulation?
  10. 10 adversary emulation workflow
  11. 11 cloud attack emulation
  12. 12 detection engineering
  13. 13 detection development lifecycle
  14. 14 example - validating detections
  15. 15 emulating the cloud attack
  16. 16 cloudtrail record
  17. 17 undetected threats!
  18. 18 resources
  19. 19 demo
  20. 20 thank you for your attention

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.