ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016

Автор: SANS Digital Forensics and Incident Response

Загружено: 2016-08-12

Просмотров: 22440

Описание: Threat actors are not magic and there is not an unlimited, unique list of threats for every organization. Enterprises face similar threats from similar threat sources and threat actors – so why does every organization need to perform completely unique risk assessments and prioritized control decisions? This presentation will show how specific, community-driven threat models can be used to prioritize an organization’s defenses – without all the confusion. In this
presentation James Tarala will present a new, open, community-driven threat model that can be used by any industry to evaluate the risk that faces them. Then he will show how to practically
use this model to prioritize enterprise defense and map to existing compliance requirements facing organizations today. Whether you are in the Department of Defense or work for a small mom-and-pop retailer, you will be able to use this model to specifically determine a prioritized defense for your organization.

James Tarala, Principal Consultant, Enclave Security; Senior Instructor, SANS Institute

James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor for many SANS auditing and security courses. As a consultant, he has spent the past few years architecting large enterprise IT security and infrastructure architectures, specifically working with many Microsoft-based directory services, e-mail, terminal services, and wireless technologies. He has also spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues, and he often performs independent security audits and assists internal audit groups in developing their internal audit programs. James completed his undergraduate studies at Philadelphia Biblical University and his graduate work at the University of Maryland. He holds numerous professional certifications.

ATTEND THE 2017 THREAT HUNTING SUMMIT: http://dfir.to/ThreatHunting2017

SANS THREAT HUNTING AND INCIDENT RESPONSE COURSES
FOR508: Digital Forensics, Incident Response, & Threat Hunting: http://sans.org/FOR508
FOR572: Network Forensics: http://sans.org/FOR572
FOR578: Cyber Threat Intelligence: http://sans.org/FOR578

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019

Похищение Мадуро, «Воскрешение» Вайтрекса, Предсказания на 2026. Classic News с Дмитрием Быковым

Похищение Мадуро, «Воскрешение» Вайтрекса, Предсказания на 2026. Classic News с Дмитрием Быковым

Hunting Cyber Threat Actors with TLS Certificates

Hunting Cyber Threat Actors with TLS Certificates

SANS Webcast: Effective (Threat) Hunting Techniques

SANS Webcast: Effective (Threat) Hunting Techniques

Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017

Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017

Поиск угроз через Sysmon — саммит SANS Blue Team

Поиск угроз через Sysmon — саммит SANS Blue Team

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Сложность пароля — это ложь. Вот что на самом деле защищает вас

Сложность пароля — это ложь. Вот что на самом деле защищает вас

Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017

Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017

You MUST understand Cyber Threat Intelligence to Blue Team w/Samuel Kimmons

You MUST understand Cyber Threat Intelligence to Blue Team w/Samuel Kimmons

CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker

CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker

Intelligence Preparation of the Cyber Environment - SANS Cyber Threat Intelligence Summit 2018

Intelligence Preparation of the Cyber Environment - SANS Cyber Threat Intelligence Summit 2018

1. Introduction, Threat Models

1. Introduction, Threat Models

Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats

Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats

Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020

Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020

Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017

Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Tales from the Network Threat Hunting Trenches & AI Hunter Demo

Tales from the Network Threat Hunting Trenches & AI Hunter Demo

How to Build Threat Hunting into Your Security Operations | Red Canary

How to Build Threat Hunting into Your Security Operations | Red Canary

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]