Time
4 hours 42 minutes
Difficulty
Advanced
CEU/CPE
5

Video Transcription

00:00
Hello and welcome to the third lesson from the module dissemination and feedback. In this lesson, we will focus all the operational intelligence.
00:10
This lesson is dedicated to fully understand operational and diligence, and it's different suspects. We will start with an understanding off what is operational intelligence. We will see the operational decisions and some of the benefits offer it by operational intelligence.
00:29
And we will finish with a quick overview
00:32
all the appropriate audience off. Operational Cyber intelligence
00:37
Operational intelligence is really time or near real time intelligence, often derived from technical means, and deliver it to ground troops engaged in activity against the adversary. Operational Cyber intelligence is data that can inform
00:57
Day Today decision making,
00:59
resource allocation and task prioritization. It includes
01:03
trends analysis showing the technical direction off threat actors
01:10
indications that an adversary has selected a particle er target and revelation off malicious tactics, techniques and procedures. It can also be useful in identifying threats against your network.
01:25
Examples off operational cyber intelligence include information feats from an information sharing and in the License Center or Zach
01:36
and alerts from the Department of Homeland Security, D. H s about a new threat threat
01:44
operational decisions made by security professionals. I t teams and even executed ve
01:51
are better informant with the knowledge off which tools adversaries are using, which vulnerabilities are they exploiting
02:00
and what techniques all our defenders are using to successful the mitigate the threat. This will enable decisionmakers toe better, prioritize daily work schedules,
02:13
build security teams and collaborate with outside the parliaments and business leaders. Other operational decisions include the policies you put into your I T systems
02:25
to automatically respond to tactical threats when he's comes to operational intelligence
02:32
and on the list can build a solid picture off actor methodology by bursting together tactical indicators and artefacts.
02:43
And there I've it into operational intelligence. This
02:46
can help toe in Ridge's security events and alerts for known bad atomic uses.
02:53
Equipment security Personal Now with the contacts that they need to make better security decisions. It can also help enhance incident response plans and mitigation techniques for future attacks and incidents.
03:08
It can help as well to implement on bolster a proactive discovery program or threat hunting program toe. Identify suspicious files on activity that has bypassed the traditional security technologies. It can help also
03:25
toe extract useful wreck teaming techniques
03:30
based on Attackers methods in the white. It can also help to perform actor based
03:38
or Mel. We're family based analytics for high risk threats through company industry, geography or nation. And finally,
03:49
they can also help to develop detection methodologies that are not dependent on Isis insuring broader coverage off threats in a more timely fashion.
04:00
Let's see the audience off operational cyber intelligence operations. Cyber Threat Intelligence is intended for an almost exclusively technical audience.
04:13
For example, we can find security operations, personnel and managers
04:18
so it unavoidably includes technical context.
04:23
In many ways, true operational Threat intelligence is the Holy Grail off security,
04:30
providing the fenders with an opportunity to put controls in place and block attacks before the A cure.
04:36
Operational threat Intelligence provides a greater level off context than tactical threat intelligence.
04:44
The main goal off operational cyber intelligence is to understand threat actors and their modus operandi.
04:53
It helps security teams investigate the capabilities, intent and methods, or Teepees
05:00
provides, imposed through network architect system administrators, et cetera,
05:04
And this is what we discover it during this video. Starting from the first part, the finding operational cyber intelligence, then seeing operational decisions and the benefits off operational intelligence. Tow the audience off this type of intelligence.
05:23
This is all for this video. I hope you enjoyed this lesson.
05:28
The next lesson will be about strategy, intelligence,
05:31
and it will be our last video off this module.

Up Next

Advanced Cyber Threat Intelligence

Advanced Cyber Threat Intelligence will benefit security practitioners interested in preventing cyber threats. Learn how to leverage your existing data sources to extract useful information and find complementary information from external sources.

Instructed By

Instructor Profile Image
Alyssa Berriche
Instructor