filmov
tv
Threat-Informed Detection Engineering
![preview_player](https://i.ytimg.com/vi/2czm8dhziX8/sddefault.jpg)
Показать описание
Presented by: Jorge Orchilles and Chris Peacock
Have you conducted a purple team exercise that’s left you wanting greater detection coverage? Perhaps it’s to catch threat actors earlier in the attack. Maybe, it’s to cover more detection opportunities in case a threat changes some procedures. In any instance, detection engineering should be driven by intelligence to ensure coverage of real-world threats targeting your organization.
This webinar will cover the detection engineering process and how operationalized purple teaming drives it. Every environment is unique and needs custom detections tailored to the environment and its threats. Operationalized purple teaming shows us, with a certain degree of confidence, what it would look like if a threat were to attack. Purple team emulations allow Blue Teams and Detection Engineers to check log sources and develop detections around common questions like, “is it normal for the targeted process to behave this way in our environment?” Join us to learn more about threat-informed detection engineering and how it fits into Purple Teaming.
Have you conducted a purple team exercise that’s left you wanting greater detection coverage? Perhaps it’s to catch threat actors earlier in the attack. Maybe, it’s to cover more detection opportunities in case a threat changes some procedures. In any instance, detection engineering should be driven by intelligence to ensure coverage of real-world threats targeting your organization.
This webinar will cover the detection engineering process and how operationalized purple teaming drives it. Every environment is unique and needs custom detections tailored to the environment and its threats. Operationalized purple teaming shows us, with a certain degree of confidence, what it would look like if a threat were to attack. Purple team emulations allow Blue Teams and Detection Engineers to check log sources and develop detections around common questions like, “is it normal for the targeted process to behave this way in our environment?” Join us to learn more about threat-informed detection engineering and how it fits into Purple Teaming.
Threat-Informed Detection Engineering
Threat Informed Defense and MITRE Detection Engineering
How To Become A Threat Detection Engineer w/ @TayOnTech
ISACA Edmonton: Special presentation on Threat-Informed Detection Engineering (27-Oct-2023)
Threat Hunting SANS: What is Detection Engineering?
Security Snippets: Threat Research for Detection Engineering
Synergizing Threat-Informed Defense: When Cloud Attack Emulation Meets Detection Engineering
Day In The Life of a Detection Engineer at Datadog | Cybersecurity Work Vlog
Session 1 | Crash Course in Detection Engineering by Julie Sparks, #Wicked6 2022
how cyber security engineers write/review threat detection code
Rethinking Detection Engineering – Jared Atkinson (SO-CON 2020)
Resilient Detection Engineering | Olaf Hartong | WWHF Deadwood 2020
Let's talk about Detection Engineering
Achieving a Threat-Informed Defense with MITRE ATT&CK - Ben Opel | CypherCon 6.0
Threat-Informed Defense With Tidal Cyber
Formulating an Intelligence-Driven Threat Hunting Methodology
The Magic of Cross Platform Threat Detection
Hunting in the Depths - The Need for a Strategic Threat Detection Model
Cloud Threat Detection Engineer at 20 years old, NO COLLEGE DEGREE?!?
5.4 Expanding Time, Terrain, & Behavior - MAD20 Threat Hunting & Detection Engineering Cours...
Formulating An Intelligence-Driven Threat Hunting Methodology
4.5 Communicating with Network Managers - MAD20 Threat Hunting & Detection Engineering Course
Synergizing Threat-Informed Defense | Kennedy Torkura | Conf42 Cloud Native 2024
Intel as Code - Building a Threat Informed Security Organization
Комментарии