This repository is a collection of useful links pointing to threat intelligence talks, courses, books or any other topic where threat intelligence can help your organizastion or your team when analyzing threats or groups.
Link | Title | Watched |
---|---|---|
https://www.youtube.com/watch?v=-1ygjCFTWps | Mark Your Calendars: Why Dates Matter to Adversaries | yes |
https://www.youtube.com/watch?v=PKc4sr5yCXA | Integrated Intelligence | |
https://www.youtube.com/watch?v=Qm5uLzphP3g | The Joy of Threat Landscaping | |
https://www.youtube.com/watch?v=_AN2XrtsdlI | Quantifying Intelligence: Increasing Executives IQ | |
https://www.youtube.com/watch?v=ea50SyPBDBo | DFIR Summit 2016: Leveraging Cyber Threat Intelligence in an Active Cyber Defense | |
https://www.youtube.com/watch?v=_84eA4jQOec | Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016 | |
https://www.youtube.com/watch?v=ckVZWxz7C8M | Integrating Cyber Threat Intelligence using Classic Intel Techniques - CTI SUMMIT 2017 | |
https://www.youtube.com/watch?v=F-MYBVINkKs | Building Strategic Return on Investment Through Cyber Intelligence | |
https://www.youtube.com/watch?v=3CUNlgQBwc4 | Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats | |
https://www.youtube.com/watch?v=IETRHdMejaw | We’re in Now, Now: The Tyranny of Current Intelligence and How to Manage It | |
https://www.youtube.com/watch?v=KJIqgQKoHYg | Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020 | |
https://www.youtube.com/watch?v=cn-O8NDlwZs | Threat Actor of in-Tur-est: Unveiling Balkan Targeting | |
https://www.youtube.com/watch?v=h076AA1ZroY | Hunting and Scoping A Ransomware Attack | |
https://www.youtube.com/watch?v=J7e74QLVxCk | The Cycle of Cyber Threat Intelligence | yes |
https://www.youtube.com/watch?v=1BBw9GO7g74 | Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit | |
https://www.youtube.com/watch?v=jzHw8lkocXA | Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017 | |
https://www.youtube.com/watch?v=E4oJdOhLEnU | Leveraging Curiosity to Enhance Analytic Technique - SANS Cyber Threat Intelligence Summit 2018 | |
https://www.youtube.com/watch?v=USQL8w8EOzM | Unsolved Mysteries – Revisiting the APT Cold Case Files - SANS CTI Summit 2019 | |
https://www.youtube.com/watch?v=ea50SyPBDBo | DFIR Summit 2016: Leveraging Cyber Threat Intelligence in an Active Cyber Defense | |
https://www.youtube.com/watch?v=kNv2PlqmsAc | Survival Heuristics: My Favorite Techniques for Avoiding Intelligence Traps - SANS CTI Summit 2018 | |
https://www.youtube.com/watch?v=ixfaaVd4rlY | Information Anarchy: A Survival Guide for the Misinformation Age - SANS CTI Summit 2018 | |
https://www.youtube.com/watch?v=II35Yh_E7ao | Did I do that? - Understanding action & artifacts w/ Matthew Seyer & David Cowen - SANS DFIR Summit | |
https://www.youtube.com/watch?v=6NmMPJ0OIls | Common misconceptions and mistakes made in Threat Hunting | |
https://www.youtube.com/watch?v=MBVxaE9oaMQ | MITRE ATT&CKcon 2018: 5 Ways to Screw Up Your Security Program with ATT&CK | |
https://www.youtube.com/watch?v=YhsN5pBDrGY | MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK | |
https://www.youtube.com/watch?v=bkfwMADar0M | Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels | |
https://www.youtube.com/watch?v=GjquFKa4afU | Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018 | |
https://www.youtube.com/watch?v=qg-zK2zv4ng | How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017 | |
https://www.youtube.com/watch?v=hAsKp43AZmM | MITRE ATT&CKcon 2.0: How a Threat Hunting Team Has Upgraded Its Use of ATT&CK | |
https://www.youtube.com/watch?v=XpuAnF5TLVA | Measure What Matters: How to Use ATT&CK to Do the Right Things in the Right Order | |
https://www.youtube.com/watch?v=gmqs10b97jw | ATT&CK-Onomics: Exploring The Economics Behind Techniques Used By Adversaries | |
https://www.youtube.com/watch?v=3R3cwP3yFK4 | Helping Small Companies Leverage CTI with an Open Source Threat Mapping | |
https://www.youtube.com/watch?v=IWA0T-GpQDk | From Theory To Practice: How My ATT&CK Perspectives Have Changed | |
https://www.youtube.com/watch?v=9nUNuwiN52s | Sharpening Your Threat Hunting Program with ATT&CK Framework | |
https://www.youtube.com/watch?v=xbnSuKTMkKo | Using ATT&CK To Create Cyber DBTs For Nuclear Power Plants | |
https://www.youtube.com/watch?v=70pR0Er2s5c | Mapping The Eventbot Mobile Banking Trojan With MITRE ATT&CK For Mobile | |
https://www.youtube.com/watch?v=f1E6bquRxlA | ATT&CKing The Cloud: Hopping Between The Matrices | |
https://www.youtube.com/watch?v=dEORNlCS7xc | Building Detections For Cloud With Kql and ATT&CK | |
https://www.youtube.com/watch?v=M_uG_hlmTcA | Putting the PRE into ATT&CK | |
https://www.youtube.com/watch?v=z2R0oc70lc8 | Starting Over with Sub-Techniques: Lessons Learned Remapping Detection Analytics | |
https://www.youtube.com/watch?v=WJz6zXJ0ABs | Using MITRE PRE-ATT&CK and ATT&CK In Cybercrime Education and Research | |
https://www.youtube.com/watch?v=07YoerY050I | Without Attacking: Transforming Adversary Emulations Into A Data Analysis Question | |
https://www.youtube.com/watch?v=CNTAK54JxrI | Ta505 - A Study of High End Big Game Hunting In 2020 | |
https://www.youtube.com/watch?v=hAsKp43AZmM | MITRE ATT&CKcon 2.0: How a Threat Hunting Team Has Upgraded Its Use of ATT&CK | |
https://www.youtube.com/watch?v=t6joWR3mqDk | MITRE ATT&CKcon 2.0: ATT&CK Updates – CAR and Analytics | |
https://www.youtube.com/watch?v=z47g13s2xVA | MITRE ATT&CKcon 2.0: The World’s Most Dangerous ATT&CKers | |
https://www.youtube.com/watch?v=IKogtrsN214 | MITRE ATT&CKcon 2.0: Threat-Informed Defense: Where do we go from here? | |
https://www.youtube.com/watch?v=iayII8CCGUI | MITRE ATT&CKcon 2.0: attckr: Toolkit of ATT&CK Incident Data for Service Providers & Organizations | |
https://www.youtube.com/watch?v=V--wxuSEMD0 | MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities | |
https://www.youtube.com/watch?v=XVGXfFcUvYc | MITRE ATT&CKcon 2.0: Tell Tall Tales with ATT&CK! | yes |
https://www.youtube.com/watch?v=bWB6qWoFT_M | MITRE ATT&CKcon 2.0: From Susceptible to ATT&CK: A Threat Hunting Story | |
https://www.youtube.com/watch?v=vIxqd0Qt_D8 | MITRE ATT&CKcon 2.0: AMITT: ATT&CK-based Standards for Misinformation Threat Sharing | |
https://www.youtube.com/watch?v=LydtAdCL114 | MITRE ATT&CKcon 2.0: Lessons in Purple Teaming with ATT&CK | |
https://www.youtube.com/watch?v=v5CoPkeVQCI | MITRE ATT&CKcon 2.0: Flashback with ATT&CK - Exploring Malware History with ATT&CK (2003-2018) | yes |
https://www.youtube.com/watch?v=AsSAsBdkns0 | MITRE ATT&CKcon 2.0: Raiders of the MITRE Framework: How to Build Your Own Threat Library | |
https://www.youtube.com/watch?v=n_6f_FKEzxo | DeadRinger: Three APTs Walk into a Bar | |
https://www.youtube.com/watch?v=ho_rAgKXCss | ATT&CK™ Your CTI w/ Lessons Learned from 4 Years in the Trenches | |
https://www.youtube.com/watch?v=N1ZmFYlNlR8 | HackInBo® Winter Edition 2019 "Evoluzione degli APT attraverso la supply chain" | |
https://www.youtube.com/watch?v=T9WV_sr_2qk | BHIS: How To Use Threat Intelligence |