January 31: 11 a.m. – noon EST // 10 – 11 a.m. CST // 8 – 11 a.m. PST
In this webinar, ThreatConnect researcher Alex Valdivia will walk through his team’s workflows for hunting threats, analyzing malware and network infrastructure, and using the intelligence derived from that work to better understand and defend against adversaries. In addition, he will discuss the underlying concepts that guide those workflows, as well as best practices related to threat intelligence data models, data hygiene (e.g. false positive management) and orchestration.
- How to apply threat intelligence analysis techniques to malware and malicious or suspicious network infrastructure
- How to organize intelligence in a way that helps you exploit your adversary’s techniques
- How ThreatConnect Playbooks help a research team automate workflows and spend more time on real analysis
This webinar is open to RH-ISAC Core Members and retail cybersecurity practitioners eligible for Core membership. Email events@RH-ISAC.org to RSVP today!