Overview
Syllabus
Intro
All conflicts between ourselves and the adversa visualized as a function of three components
Let's dissect that exact information we want to understand about the adversary
How do we conduct threat intelligence in each capability areas?
What are some of the best practices & common
There are generally three different types of thre intelligence stakeholders
The Threat Intelligence team should be designe serve the organization's stakeholders
Scenario 1: A financially motivated eCrime actor to conduct a ransomware attack
Scenario 2: A nation-state actor with intent to a espionage against a pharmaceutical company
In summary, we talked about the following
Taught by
RSA Conference