CYBER THREAT & SECURITY INTELLIGENCE

Best Practices to Handle the Most Serious Threats in the Digital Era

ENQUIRY: +66 (0) 2158 9892 (TH) | +66 (0) 97 936 6304 (ENGLISH LINE)
EMAIL: CONFERENCE@OMEGAWORLDCLASS.ORG

Most professionals in cyber security have only a very basic idea of what cyber threat intelligence is, or how to collect and analyze cyber threat intelligence.Cyber threats are among the most critical risks of all.

Understanding what the specific threats are to one’s organization is the keystone to creating an appropriate security plan and to responding to incidents effectively.  And that understanding can only be based on appropriate cyber threat intelligence.

This course will give attendees a strong understanding of cyber threat intelligence, as well as specific methodologies that they can undertake to collect, process, and analyze cyber threat intelligence.

You will learn general concepts as well as specific techniques and processes.  At the end of the course, attendees will be able to apply these techniques to the collection and analysis of cyber threat intelligence information.

KEY TECHNIQUES TO COUNTERMEASURES THE FUTURE OF CYBER THREATS

• Develop cyber security platform to counter measurecyber risks
• Analyse & stay at the frontier of evolving cyber threats into the future
• Analyse & optimise your security intelligence to fight against cyber threats
• Assess potential cyber-attack & devise your IT incident response plan 


SUPER HOT ISSUES OF CYBER SECURITY THREAT YOU MUST LEARN

  • Cyber trade craft
  • Tactical vs Strategic Intelligence
  • Event Recording and Incident Sharing (VERIS)
  • IOC (Indicators of Compromise)
  • The Kill Chain and Intrusion Analysis
  • Cyber warfare
  • Cyber espionage
  • Cyber terrorism
  • Hactivism and Other Actors
  • The Conduct of Cyber Threat Intelligence Gathering
  • The Conduct of Cyber Threat Intelligence Analysis
  • The Use of Open Source Intelligence (OSING)
  • Incorporating intelligence into incident response
  • The role of forensics in incident response
  • Malware analysis and cyber threat intelligence
  • Zero Day Exploits
  • Failure to use the correct method or tool

BEST-IN-CLASS LEARNING METHODOLOGY:

The workshop will include hands-on labs/exercises with methods and tools such as:

  • Cybox
  • Maltego
  • OpenIOC
  • Yara
  • TLP (Traffic Light Protocol)
  • TAXII (Trusted Automated eXchange of Indicator Information)

WHO SHOULD ATTEND
Anyone in cyber security, particularly law enforcement, military, and intelligence agencies, but civilian cyber security professionals will also benefit