A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Open Source Threat Intelligence: Developing a Threat intelligence program using open source tools and public sources - Edward McCabe Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Open Source Threat Intelligence: Developing a Threat intelligence program using open source tools and public sources
Edward McCabe
Derbycon 2014

Overview of building a threat intelligence program outlining the processes, tasks and activities associated with the development of a functional intelligence program. Developing an Open Source Threat Intelligence Program from Open Source Tools and Public Sources is aimed at bringing business value and technical mitigation efforts, while dispelling common myths like “We’re too small”, “Who would attack us, we make widgets?” and “We have nothing anyone would want”. Follow one geek’s journey developing a Threat Intelligence program on the Internet of (bad) things as he began a mission to slay FUD Dragons. Learn how to leverage public sources and open source tools to protect your organization. This high-level overview centers on building a Threat Intelligence program and includes topics ranging from the threat intelligence life-cycle to specific tasks, in addition to lessons learned and what to keep in mind when developing your own Threat Intelligence program.

Back to Derbycon 2014 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast