A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Developing and Open Source Threat Intelligence Program - Edward McCabe (@edwardmccabe) (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)

Developing and Open Source Threat Intelligence Program
Edward McCabe (@edwardmccabe)

Developing an Open Source Threat Intelligence Program from Open Source Tools and Public Sources is aimed at bringing business value and technical mitigation efforts, while dispelling common myths like "We're too small", "Who would attack us, we make widgets?" and "We have nothing anyone would want". Follow one geek's journey developing a Threat Intelligence program on the Internet of (bad) things as he began a mission to slay FUD Dragons. Learn how to leverage public sources and open source tools to protect your organization. This high-level overview centers on building a Threat Intelligence program and includes topics ranging from the threat intelligence lifecycle to specific tasks, in addition to lessons learned and what to keep in mind when developing your own Threat Intelligence program.

Bio: Edward McCabe is an information security professional with over 20 years consulting experience with Fortune 100 companies, various domestic state & federal agencies, in addition to various foreign government agencies. Industries supported include Financial Services, Defense, Retail, Electric Power Transmission, Distribution & Marketing, Hospitality, Health Care, Construction, Insurance, and Media. Edward has presented to numerous organizations and conferences on issues such as Social Engineering, PCI DSS, Threat Intelligence, Practical Security Data Visualization, Attack & Penetration Testing, Internal IT Audit Practice Development, Enterprise Risk Management, and Adopting Information Security into the Business Corporate Culture.

Back to BSides Huntsville 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast