POST-CONFERENCE WORKSHOP : THREAT INTELLIGENCE: LEARN TO IDENTIFY AND TO OUTSMART THE THREATS INTELLIGENTLY.
Date : 11th July 2019
Time : 9.00am - 5.30pm
Trainer : Faisal Yahya
CISSP | CCISO | CCSK | CSX-F | ITIL v3 | CISO with 20+ years exp in CyberSecurity Strategist | 15+ CIO Leadership | Researcher | PSPO I | PSM I | PRINCE 2 F |
Today’s even the most secured environment will eventually have vulnerabilities in it tomorrow, so companies can no longer allow itself to become satisfied or self-righteous. The reactive approach will no longer fit with the current threat landscape, especially for companies who are increasingly relying on digitized information and sharing the vast number of data across the globe. In today's threat landscape, it is nearly impossible to prevent every attack. With Cyber Threat Intelligence (CTI), companies can gather valuable insights based on analysis of contextual and situational risks.
In this workshop, we will share and introduce you to these procedures:
1. Collection process: collecting process from various sources that help to begin profiling malicious threat actors.
2. Clustering and Correlation: classify attacks or malware to understand how the attack flows.
3. Attribution: to identify and locate the threat actors behind these sequences of attacks.
4. Taking Down: to stop the current attack and predict the next possible steps.