| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Where you certain that Fancy Bear was in your network to find that it was really just a misconfig? Did you spend countless cycles on an incident to find out who-done-it for upper management, only to be disappointed with the lack of actionable intelligence? If you have ever been curious about Attribution or how to make Attribution work in your organization, then this talk is for you! The focus will be on the different ways organizations can maximize their defensive strategies using information shared by the enemy. You?ll learn that the ?who? and ?why? aspects of attribution mean little when compared with TTPs in most company?s cyber threat intelligence programs. Xena Olsen is a cyber threat intelligence analyst in the financial services industry. A graduate of SANS Women?s Academy with 6 GIAC certifications, an MBA IT Management, and a doctoral student in Cybersecurity at Marymount University.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast