У нас вы можете посмотреть бесплатно Building Threat Intelligence Workflows for Real-World Security Operations или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
🔴 Building Threat Intelligence Workflows for Real-World Security Operations (Turn Raw Threat Data into Actionable Security Intelligence) 📅 February 4 · 7 PM IST – Set Reminder ▶️ Most organizations consume threat feeds—but far fewer know how to operationalize that intelligence. True threat intelligence is more than lists of indicators; it is a structured, analytical process that enhances SOC efficiency, speeds up response, and helps teams anticipate attacks before they happen. This session delivers a practical, hands-on introduction to building threat intelligence workflows that directly support detection, investigation, and response in modern SOC environments. Led by Harshita Maurya, Senior Corporate Trainer, the session is designed for professionals who want to transform scattered threat data into a continuously improving intelligence function. 🔍 What you’ll learn: 1. The Threat Intelligence Lifecycle – End to End A clear breakdown of the lifecycle: • Collection • Enrichment • Analysis • Production • Dissemination • Action How each stage contributes to better decision-making and defense posture. 2. Designing Scalable Threat Intelligence Workflows How to move from manual processes to structured, repeatable workflows. Aligning workflows with SOC maturity and operational needs. Building playbooks that support both proactive and reactive use cases. 3. Real-World Use Cases for Detection, Investigation & Response Using threat intelligence to strengthen SIEM detection rules. Supporting deeper investigations through context-rich insights. Feeding IR teams with faster triage and threat prioritization. Examples from real SOC environments. 4. Enriching Threat Data with Internal & External Sources Enrichment techniques using: • OSINT • Commercial feeds • Dark web sources • Internal logs and telemetry How enrichment turns isolated indicators into meaningful intelligence. 5. Integrating Threat Intelligence with SIEM, SOAR & IR Tools Connecting intelligence to automated detection and response systems. Creating enrichment routines, automated lookups, and threat scoring. Building a unified threat picture for SOC analysts. 6. Improving Response Times with Actionable Intelligence How intelligence accelerates triage, reduces false positives, and improves prioritization. Identifying what’s relevant now vs noise. Using intelligence to proactively hunt for threats. 7. Operationalizing Intelligence – Not Just Collecting It Steps to embed intelligence into daily SOC workflows. Building team habits, dashboards, and standard operating procedures. Ensuring continuous improvement and feedback loops. 8. Live Q&A and Applied Guidance Addressing participant questions on workflows, tools, enrichment, and SOC integration. Practical insights for analysts, IR teams, SOC managers, and threat hunters. 🎯 Who should attend? Threat intelligence analysts SOC analysts and incident responders Security engineers and detection specialists Cybersecurity professionals building or maturing TI programs Anyone wanting to operationalize threat intelligence effectively Speaker: Harshita Maurya Senior Corporate Trainer | Koenig Solutions Pvt. Ltd. 📢 Follow & Learn More: 🔗 Koenig Solutions: https://www.koenig-solutions.com 🔗 LinkedIn: / koenig-solutions 🔗 Facebook: / koenigsolutions 🔗 Instagram: / koenigsolutions 🔗 Twitter (X): https://x.com/KoenigSolutions 🔗 Upcoming Webinars: https://www.koenig-solutions.com/upco... 🧠 If you want to go beyond static threat feeds and build an intelligence capability that actually improves security operations, this session gives you the framework and practical steps to do it. 👍 Like | 💬 Comment | 🔔 Subscribe for more expert-led cyber defense and SOC operations sessions. #KoenigWebinars #KoenigSolutions #StepForward #ThreatIntelligence #SOC #CyberDefense #SIEM #SOAR #IncidentResponse