Completed
Components of Good Threat Intelligence
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Operationalize ICS Threat Intelligence for Defenders
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 CTI Key Takeaways
- 3 CTI Data Sources
- 4 Components of Good Threat Intelligence
- 5 CTI, applied NIST Cybersecurity Framework
- 6 ICS Threat Intelligence The Threat Landscape has Shifted - Civilian Infrastructure has entered the crosshairs ICS-Specific Malware
- 7 What does this shift mean for ICS defenders?
- 8 Planning & Direction - PIRS
- 9 Processing and Analysis - TIA Assessment
- 10 Back to Basics - CTI Cycle Feedback Critical to Planning & Direction . Always be refining
- 11 USE CASE - THREAT DETECTION
- 12 USE CASE - THREAT HUNTING
- 13 USE CASE - INCIDENT RESPONSE
- 14 USE CASE - VULN MANAGEMENT
- 15 USE CASE - SOCIALIZATION OF THREATS
- 16 USE CASE - JUSTIFICATION OF INVESTMENT IN OT CYBERSECURITY
- 17 USE CASE - RESPOND TO RFIS
- 18 USE CASE - ASSESSMENT OF DEFENSES AND RED TEAMING