B1 Blue Team Basics: Threat Intel in the Cyber Attack Lifecycle presented at ThreatIntelligence 2016

by Dave Ockwell-jenner,

Summary : There is sometimes a tendency to collect and analyze threat intelligence just for its own sake. As Threat Intel Analysts, we find, filter and forward our work product, but what happens to it after that? In this session we will explore how different types of threat intelligence are leveraged at each stage of the Cyber Attack Lifecycle; how our blue team defenders can apply intelligence to thwart attack. Let's complete the circle and find out how we can tailor out intelligence for maximum benefit.