Cyber Threat Intelligence

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:01
Welcome to Module three.
00:02
This module is split into five lessons, which all focused on the central theme of operational izing attack.
00:11
Specifically,
00:13
we will explore how we can apply the knowledge captured in the attack to various cyber security operations and practices.
00:19
How this enables us as defenders to perform what we call threatened form defense or the systematic application of a deep understanding of adversary, trade, craft and technology to prevent, detect and respond to cyberattacks.
00:31
Without further ado, let's dive in
00:36
welcome to model three less than one
00:39
cyber threat intelligence.
00:43
In this lesson, we will explore the importance of cyber threat intelligence with insecurity operations
00:49
and appreciate how attack can provide a starting point and structure for tracking this intelligence
00:57
in any battle. Intelligence and knowledge very often separates winners and losers,
01:03
and cyber is no different as Cyber Threat Intelligence or SETI. I allows us to track, understand and maybe even get ahead of what our adversaries are doing.
01:15
Attack provides a great starting point for identifying what behaviors have been reported for specific groups, or malware.
01:23
As you recall, the model allows us to map adversaries to their behaviors via techniques or some techniques
01:29
while also capturing references to the publicly available Cyber Threat Intelligence describing these behaviors.
01:40
But as we know, CT comes in various forms.
01:42
In this case, we can see impactful and powerful intelligence captured in the form of blogs,
01:49
reported command lines or even tweets.
01:57
But attack allows us to consistently capture, share and distribute this intelligence.
02:01
Specifically, we can decompose these reports and capture the associated behaviors and capture them within the model presented by attack.
02:14
And with that, we use the knowledge check for less than one.
02:16
Which of the following is not true?
02:20
Please positive video and take a second to think of the correct answer before proceeding
02:25
eyes.
02:30
In this case, the correct answer was B.
02:31
The data attack can opus format and find cyber threat intelligence.
02:36
But since the data is already mapped to publicly available reporting and documentation, we're probably not going to produce anything new.
02:46
And with that, we reached the end of Lesson one.
02:49
In summary, intelligence is critical for decision making as well as providing priorities and shaping cyber security operations.
02:57
An attack provides a starting point and means for structuring this intelligence about adversary behaviors
Up Next