Applying Threat Intelligence

In this presentation from Tripwire’s Threat Intelligence University: Threat Intelligence from the Ground Up, Ken Westin focuses on making use of threat intelligence data sources, with an emphasis on utilizing tools many organizations already have in place, integration of open source tools and both open and commercial data feeds. He covers the basics of IoCs and open formats for sharing data (STIX, TAXII, Yara, OpenIOC), identifying data types and classifications and where to use different indicators, with a number of specific use cases around: intrusion detection, phishing, insider threat and espionage.

Watch Video