Session
Organizer 1: Private Sector, Asia-Pacific Group
Speaker 1: Dhiyanesh Balasubramanium, Private Sector, Asia-Pacific Group
Speaker 2: Kanagasundaram K, Private Sector, Asia-Pacific Group
Speaker 3: Prakash Gopalakrishnan, Private Sector, Asia-Pacific Group
Speaker 2: Kanagasundaram K, Private Sector, Asia-Pacific Group
Speaker 3: Prakash Gopalakrishnan, Private Sector, Asia-Pacific Group
Format
Classroom
Duration (minutes): 90
Format description: Organizing the session within a closed network will lead to better understanding and reachability to the stakeholders. The duration of 90 minutes will make the audience understand the CTI concepts through a hands-on session effectively.
Duration (minutes): 90
Format description: Organizing the session within a closed network will lead to better understanding and reachability to the stakeholders. The duration of 90 minutes will make the audience understand the CTI concepts through a hands-on session effectively.
Policy Question(s)
A. Assessing the motives, strategies, methods, and procedures (TTPs) of international cyber threat actors.
B. Engaging in cybersecurity threat intelligence training and educational initiatives can assist in building a trained workforce capable of dealing with cyber threats.
C. AI can automate vulnerability assessment and identification, allowing businesses to find and correct flaws before they are exploited.
What will participants gain from attending this session? The participants could simulate the entire kill chain in minutes without risk and work with real-world malware and techniques;
Quickly/easily identify misconfigurations and gaps;
Identify and remediate gaps in the coverage;
Risk/exposure measurements make it easy to prioritize;
Assess the detection and blocking capabilities;
Quantify exposure to specific threat vectors;
Improve the strength of security before purchasing new tools and maximize their security features in the existing tools with minimal investment;
-To scan for dangerous URLs, use UrlScan.io.
-Applying Abuse.ch to monitor malware and botnet indicators.
-Examine phishing emails with PhishTool.
-Leveraging Cisco's Talos Intelligence platform to acquire intelligence.
Description:
Most firms today concentrate their intelligence efforts on the most fundamental use cases: integrating intelligence feeds with existing networks, IPS, firewalls, and SIEMs. It's crucial to understand who is causing harm, what they want, and how they intend to do it. Who is the actor behind each threat? While there are various threat actors out there today, the majority of them fit under the following categories: Government-sponsored, organized crime, hacktivists (causing political concerns in countries), insider threats, opportunistic (script kiddies), and internal user errors. Threat Intelligence enables organizations to make faster, more informed security decisions and change their behavior from reactive to proactive in the fight against breaches. The challenge for professionals in cyber threat intelligence is distinguishing between adversely impacting use-cases and long-term tracking and knowledge of adversaries' motivations, priorities, and capabilities. In this workshop, we will look at Threat Intelligence principles, including the lifecycle, various frameworks, and a few open-source tools for analyzing harmful actions. We'll take a deep look at some important platforms that share and manage acquired intelligence, including MISP and OpenCTI.
Most firms today concentrate their intelligence efforts on the most fundamental use cases: integrating intelligence feeds with existing networks, IPS, firewalls, and SIEMs. It's crucial to understand who is causing harm, what they want, and how they intend to do it. Who is the actor behind each threat? While there are various threat actors out there today, the majority of them fit under the following categories: Government-sponsored, organized crime, hacktivists (causing political concerns in countries), insider threats, opportunistic (script kiddies), and internal user errors. Threat Intelligence enables organizations to make faster, more informed security decisions and change their behavior from reactive to proactive in the fight against breaches. The challenge for professionals in cyber threat intelligence is distinguishing between adversely impacting use-cases and long-term tracking and knowledge of adversaries' motivations, priorities, and capabilities. In this workshop, we will look at Threat Intelligence principles, including the lifecycle, various frameworks, and a few open-source tools for analyzing harmful actions. We'll take a deep look at some important platforms that share and manage acquired intelligence, including MISP and OpenCTI.
Expected Outcomes
1. Publications of research papers in Cyber Threat Intelligence through the International Reputed journals and publishers.
2. Explore different OSINT tools used to conduct security threat assessments and investigations.
Hybrid Format: 1. Through Instant Quizzes, Opinion Polls.
2. It will be based on brainstorming activities. Every single person should understand why they are there, what the workshop's aims are, and what is in scope.
3. MS-TEAMS