SANS 2025年网络威胁情报峰会嘉宾演讲PPT合集(共20套打包)

SANS 2025年网络威胁情报峰会嘉宾演讲PPT合集(共20套打包)

更新时间:2025-12-15 报告数量:20份

报告合集目录

报告预览

  • SANS 2025年网络威胁情报峰会嘉宾演讲PPT合集
    • 领导力研讨会:网络安全领域激励自己和他人的工具和策略.pdf
    • 超越 FOMO:拓展网络威胁情报分析师的视野.pdf
    • 迭代与创新:将创业思维应用于CTI.pdf
    • 高级威胁研究方法:揭开三重APT入侵的真相.pdf
    • 让网络威胁情报变得酷炫!:通过游戏教授网络威胁情报的方法.pdf
    • 解码网络威胁:攻击树实用指南.pdf
    • 拨开战争迷雾:运用系统方法捕捉和传播日益加剧的地缘政治紧张局势中的相关洞见.pdf
    • 打造 CTI 品牌:一条通往成功的道路.pdf
    • 利用 STRAT 构建网络威胁韧性:一种新的 CTI 方法.pdf
    • 明目张胆反而显得隐蔽:在网络威胁情报调查中运用经典的人力情报策略.pdf
    • 从威胁情报到检测工程:识别检测差距并提升CTI对组织价值的案例研究.pdf
    • 勒索软件集团:卡特尔还是扭曲的科技独角兽?.pdf
    • 主题演讲 _ 前瞻性方法:可操作(而非被动应对)的网络威胁情报.pdf
    • 销售和市场部门也是威胁行为者.pdf
    • 解剖蝉:在黑猫的阴影下.pdf
    • 妈妈我需要花更多时间在社交媒体上!.pdf
    • 人人都想主宰(数据)世界.pdf
    • 被遗忘的恶意软件 C2 的秘密生活.pdf
    • 多么惊人的集群:威胁行为者协作案例研究及比较归因框架.pdf
    • ONNX商店:一个针对金融机构的钓鱼即服务平台的兴衰.pdf
请点击导航文件预览
资源包简介:

1、Improving Social Maturity of Cybersecurity Incident Response TeamsSuggested Citation:Tetrick,L.,E.,Zaccaro,S.J.,Dalal,R.S.,Steinke,J.A.,Repchick,K.M.,Hargrove,A.K.,Shore,D.B.,Winslow,C.J.,Chen,T.R.,G。

2、Beyond the FOMO:Expanding Horizons for Cyber Threat Intelligence AnalystsSydney JonesHead of Threat Intelligence,CLS GroupJanuary 27,2025AgendaProblem Statement-Changing roles and where to begin?How 。

3、Iterate and Innovate:Applying the Startup Mindset to CTIJosh Darby MacLellanI believe anyone can adopt a startup mindset to improve their CTI work,regardless of organization size My career journey Ye。

4、Advanced Threat Research MethodologiesUnraveling a Triple-APT IntrusionAbout UsLior is a principal threat researcher at Palo Alto Networks,focusing on threat hunting,malware analysis and tracking nat。

5、Making CTI Cool!Methods for Teaching Cyber Threat Intelligence Through GamingBryan Quillen&Jibby SaetangWho Are These Cool Guys?The KC7 Foundation is a nonprofit organization dedicated to making 。

6、Decoding Cyber ThreatsA Practical Guide to Using Attack TreesGert-Jan Bruggink&Sherman Chu28 January 2025232233CTI&Decision-Making234Ever been in this situation?Identifying Systemic Vulnerabi。

7、157Navigating the Fog of War:A Programmatic Approach to Capturing and Communicating Relevant Insights from Rising Geopolitical Tensions158AgendaExpectationsBackground ContextCase Study 1:Russias Inva。

8、Building the CTI BrandA Path to SuccessRyan Miller&Matt Brady-TargetAbout UsSr Director,TechnologyDirector,CybersecurityRyan MillerMatt BradyWhats in a Brand?TRUSTLOGO “BRAND”Building a BrandDefi。

9、Building Cyber Threat Resilience with STRATA new Methodology for Cyber Threat IntelligenceWho We AreChandler McClellanScott J RobertsWhere Were FromWhere Were FromThe ProblemCyber Threat Intelligence。

10、Leveraging classic HUMINT tactics in CTI investigations01 28 2025Its so overt,its covert:273ABOUT USEliska PUCKOVA Cyber Threat Intelligence SpecialistJulien MASCARO Security&Forensic Investigato。

11、Whoami?Pedro Barros Security Analyst ProfessorPrevious roles:Jr.SOC Analyst Desktop Solutions Spc.Socials:0 xPEMB Pedro BarrosWhy CTI?Purpose:Decision Making Prevent DamageNeed:Advanced Warnings Acti。

12、Get Proactive|Gain ControlRansomware Syndicates:Cartels or Twisted Tech Unicorns?Ferhat DikbiyikChief Research&Intelligence OfficerJanuary 20252Black Kite Confidential“If you know the enemy and k。

13、Bridge Building and Problem Solving for the Worlds Wicked Problemst h e C E N T E R f o r A N T I C I P A T O R Y I N T E L L I G E N C EStrategic v.Anticipatory IntelligenceStrategic Intelligence:Id。

14、SALES&MARKETINGARE THREAT ACTORS,TOOby Erica Peterson&Michael J.GravenSANS#CTISummitTuesday,January 28,2025ERICA PETERSON Director of Sales&Marketing at The Vertex Project for 4+years Own。

15、Title xxxxxxxxxName,role,dateTitleName,Role,DateDissecting the Cicada In the Shadow of the Black CatMattias Whlen,Nicklas KeijserA Ransomware Incident Autumn 2024 Less then 50 Servers ESXi ransomware。

16、TLP:WHITEBut Mom,I Need To Spend More Time on Social Media!Bridging CTI and Fraud:UnderstandingSocial Media Cyber Threat Landscape and BeyondDaniel Widya Suryanata&Jurgen VisserTLP:WHITETLP:WHITE。

17、Everyone Wants to Rule the World(of data)John Stoner(Civ)+John E.Stoner(Army)Global Principal Security StrategistJohn Stoner(Civ)Focuses on improving analyst capabilities in Security Operations,Threa。

18、Whoami CTI analyst Just finished my masters degree Certifications include CISSP GSEC GCTI Splunk CertsThe Pyramid of Pain The Pyramid of Pain Indicators Indicators of Compromise AKA“IOC”of Compromise。

19、What a clusterA case study in threat actor collaboration and framework for comparative attributionPwC Threat IntelligenceSANS CTI Summit 2025TLP:WHITE IntroductionsJono Davis Technical AnalystPwCBeen。

20、Sr.Cyber Threat Intelligence Analyst EclecticIQArda BykkayaONNX Store:The Rise and Fall of a Phishing-as-a-Service Platform Targeting Financial Institutions Understanding Phishing-as-a-Service(PhaaS)。

展开阅读全文
客服
商务合作
小程序
服务号
折叠