Geo-Specific , Next-Generation Technologies & Secure Development , Threat Intelligence
Breaches: How to Use Threat Intelligence to Generate IOCs; Other Tips to Find, Analyze and Mitigate Risk
In this session, a security technologist discusses and reviews the anatomy of a breach, including the effects a breach has in real and soft money. He also reviews attacker motivations and how threat intelligence can correlate activities to help highlight indicators of compromise and analyze and mitigate the damages of breaches, offering a summary of how to protect your organization and keep it out of the headlines.
See Also: Darktrace Immune System: Self-Learning Detection & Response