Overview
Explore Threat Informed Defense, an efficient approach for overwhelmed security teams, in this 45-minute webcast from RSA Conference. Learn how to create a threat model using community-gathered intelligence and leverage technique or behavior-based detections. Discover strategies for enterprise defenders to protect evolving organizations against complex threats like ransomware groups and nation-state espionage. Delve into topics such as the Pyramid of Pain, threat actors, tactics, techniques, and attack frameworks. Gain insights on finding and tracking threat actors, using open-source tools, and implementing a threat detection lifecycle. Join Fred Stankowski, Director of Security Operations at Box's Global Security Office, as he guides you through prioritizing and focusing cybersecurity efforts to make the most efficient use of resources in a rapidly changing threat landscape.
Syllabus
Introduction
Agenda
Minor Attack
Theory
Pyramid of Pain
Threat Actors
Tactics
Techniques
Attack Framework
Recap
How do you approach this
Threat model
Threat Informed Defense
How do we find threat actors
Raiding the threat actors
Open Source Tracking Sheet
Attack Navigator
Data Source
Threat Actor Group
High Impact Tactics
Threat Detection Lifecycle
Questions
Taught by
RSA Conference