Mitigating Risks Thru Threat Intelligence Analysis
This session will explain the various stages involved in the Threat Intelligence Life Cycle, from collection of data as well as Information Sources to be used in Analysis, to controlling business risks by converting unknown internal and external threats into actionable threat intelligence.
The session also covers topics such as: Upgrading defenses and creating countermeasures by acquiring intelligence related to the Tactics, Techniques, and Procedures (TTPs) of potential threat actors. Understanding Advanced Persistent Threat (APT) lifecycle, combat modern-day cyber-attacks and prevent future attacks. Acquiring and collect data through Open Source Intelligence (OSINT), and Indicators of Compromise (IoCs). Best Practices to help organizations effectively implement security systems through the use of intelligence analytics.