A Practical Guide to Identifying TTPs With Threat Intelligence

Presented by

Levi Gundert, Vice President of Information Security Strategy, Recorded Future

About this talk

To effectively combat threats to the enterprise, security teams must understand their organization’s adversaries and the attack tools, techniques, and processes (TTPs) they are wont to weaponize. Threat analysts can create that picture for security teams, ultimately providing a set of actionable recommendations for threat management, by piecing together data from the Web that indicates a threat to the enterprise. During a recent webinar, Levi Gundert, Vice President of Information Security Strategy at Recorded Future, shared research on the latest attacker tools, provide architecture recommendations for organizations looking to strengthen security controls, and help analysts use threat intelligence to more quickly and effectively identify threat trends. Watch this webinar to learn how to: * Apply methodologies for proactive and strategic source identification and information analysis. * Understand vendor information sources. * Prioritize threats in a business context. * Differentiate between vulnerability management and threat intelligence. * Use best practices for working with peer teams to test and strengthen security controls.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (60)
Subscribers (16902)
Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context that’s delivered in real time and packaged for human analysis or instant integration with existing security technology.