Threat Intel for Computer Network Defence, Focus on Iran

Presented by

Dan Caban, Manager Professional Services Consulting, Mandiant & Hussein Khalifa, Senior Consultant, Mandiant

About this talk

Operationalising Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity that matters. Above all, it allows organisations to take a more proactive, structured, and holistic approach to security that reduces dwell time and shortens the time frame from detection to remediation. In today's dynamic threat environment, CTI it is critical to ensure you have an understanding of the adversaries you are hunting for and responding to. Join us as we look specifically at how cyber threat intelligence can help improve computer network defence (CND) operations. Our experts will share: • A review of FireEye’s Iranian relevant threat intelligence • Case studies that: •will provide examples of how Mandiant incident response consultants operationalise threat intelligence when responding to intrusions • will examine how operators can pivot from intelligence reporting to high confidence alerting and targeted threat hunting • Along with the MITRE ATT&CK framework to help decision makers improve their overall network security posture by prioritising security investments based on adversary capabilities • How intelligence enhances your overall cyber security investment and places your operations ahead of the threat
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (147)
Subscribers (51796)
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix’s security experts, along with an extensive partner ecosystem, accelerate technology innovation through data science and automation to empower over 40,000 business and government customers. More at