Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Threat Intelligence Sharing and Automation Wins the War against Attackers

RSA Conference via YouTube

Overview

Explore a 49-minute conference talk from RSA Conference that delves into the critical role of threat intelligence sharing and automation in combating cyber attackers. Learn how security teams can leverage collective expertise to identify potential threats early, minimizing damage through effective information sharing. Discover the benefits and challenges of real-time threat intelligence sharing, gain insights from practical use cases demonstrating the value of automation and orchestration, and explore opportunities for security teams to engage with relevant groups. Examine topics such as security automation markets, threat detection automation, vulnerability prioritization, asset management, security incident response, and operationalizing threat intelligence. Gain practical knowledge on implementing automation workflows, handling high-profile vulnerabilities, and addressing phishing attacks. Understand the importance of creating a trusted circle for sharing information, ensuring anonymity and timeliness in threat intelligence exchange, and leveraging automation to prioritize vulnerability patching effectively.

Syllabus

Introduction
Security Automation Market
Threat Detection Automation
Vulnerability Scanner Data
Automating Vulnerability Prioritization
Asset Management Database
Set the Rules
Scan Data
Deploy Patch
Automation Workflow
Security Incident Response
Research and Automation
High Profile Vulnerability Planning
Vulnerability Scanner
Shellshock Example
Security Analyst Workflow
Data Enrichment Activities
Phishing Attacks
Phishing Attack Example
More Automation
Threat Intel Sharing
Operationalizing Threat Intel
Duplicative Information
Is it real
Circle of Trust
Anonymous
Timely
Automation
Prioritize vulnerability patching
Hiring talent
Questions

Taught by

RSA Conference

Reviews

Start your review of How Threat Intelligence Sharing and Automation Wins the War against Attackers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.