CS2-3 Practical Application of Cyber Threat Intelligence: Mining Network Data for Maliciousness

Nov 19, 2014

3:45 PM - 5:00 PM

Bertha Marasky

Security Engineer


Sharing of cyber threat intelligence is critical to the success of the good guys.  This discussion is intended to help you understand and use Indicators Of Compromise (IOCs).  Applying this information allows you to identify compromised systems, detect malicious activity in your network and prevent future nefarious activity.  The end result strengthens your company's security posture.

Session Learning objectives:

  1. Understand Indicators of Compromise (IOCs).
  2. Learn practical application of IOCs for both detection and prevention.
  3. Hear ideas for ingesting and storing IOCs.