Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Connecting the Dots: How Threat Intelligence Protects Applications

OWASP Foundation via YouTube

Overview

Discover how Cyber Threat Intelligence can revolutionize your Application Security Program in this informative 27-minute conference talk. Explore the concept of Cyber Threat Intelligence and learn effective implementation strategies to safeguard your business against cyber attacks. Gain insights into integrating threat intelligence into your AppSec world, including automated data collection and processing techniques. Understand how to leverage unstructured data from various sources to identify indicators of compromise (IoCs) and threat actors' tactics, techniques, and procedures (TTPs). Acquire valuable knowledge that will empower you to prevent and mitigate potential attacks, ultimately enhancing your organization's cybersecurity posture.

Syllabus

OWASP Standard Classification: Connecting the Dots: How Threat Intelligence Protect... - C. Curelaru

Taught by

OWASP Foundation

Reviews

Start your review of Connecting the Dots: How Threat Intelligence Protects Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.