Completed
In summary, we talked about the following
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Through the Eyes of the Adversary - How to Build a Threat Intel Program
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 All conflicts between ourselves and the adversa visualized as a function of three components
- 3 Let's dissect that exact information we want to understand about the adversary
- 4 How do we conduct threat intelligence in each capability areas?
- 5 What are some of the best practices & common
- 6 There are generally three different types of thre intelligence stakeholders
- 7 The Threat Intelligence team should be designe serve the organization's stakeholders
- 8 Scenario 1: A financially motivated eCrime actor to conduct a ransomware attack
- 9 Scenario 2: A nation-state actor with intent to a espionage against a pharmaceutical company
- 10 In summary, we talked about the following