Overview
Syllabus
Introduction
Security Automation Market
Threat Detection Automation
Vulnerability Scanner Data
Automating Vulnerability Prioritization
Asset Management Database
Set the Rules
Scan Data
Deploy Patch
Automation Workflow
Security Incident Response
Research and Automation
High Profile Vulnerability Planning
Vulnerability Scanner
Shellshock Example
Security Analyst Workflow
Data Enrichment Activities
Phishing Attacks
Phishing Attack Example
More Automation
Threat Intel Sharing
Operationalizing Threat Intel
Duplicative Information
Is it real
Circle of Trust
Anonymous
Timely
Automation
Prioritize vulnerability patching
Hiring talent
Questions
Taught by
RSA Conference