Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how to extract more value from threat intelligence programs and operationalize them within organizations in this 52-minute conference talk from Shmoocon 2020. Delve into the challenges of true attribution, including false flag operations and proxy attackers, and learn why Tactics, Techniques, and Procedures (TTPs) offer a cost-effective alternative for tracking threat activity groups. Discover Adversary Detection Pipelines and their practical implementation to prioritize defensive and offensive activities. Examine case studies demonstrating how purple teams can leverage these pipelines to enhance operations and foster intelligence-driven security programs. Gain insights from Xena Olsen, a threat intelligence analyst in the financial services industry with extensive cybersecurity credentials, as she shares strategies to level up security teams and departments.