Overview
Explore a comprehensive conference talk on building data science capabilities for threat intelligence in cybersecurity hunt teams. Delve into the intelligence cycle, operational environment, and contextual threat intelligence concepts. Learn about the role of data scientists in security, the ELK stack, and implementing a data-driven security approach. Gain insights on integrating intelligence gathering, analysis, and dissemination processes to enhance threat hunting capabilities and improve overall cybersecurity posture.
Syllabus
Introduction
What is Intelligence
Network Perimeter Boundary
Capabilities Brief
Specified Tasks
Intelligence Cycle
Hip Pocket Training
The Intelligence Cycle
Analyze the raw data
Develop the picture dissemination
Operational Environment
Intelligence
Persistence
Internal Threat Intelligence
RapidDissemination
Threat Intelligence
Contextual Threat Intelligence
The Hunt
Elk Stack
What is a Data Scientist
DataDriven Security
Showdown
Data Science Program