Operationalizing Threat Intelligence with Automation and Collaboration


Details
Software yang tidak aman telah mengancam infrastruktur keuangan, kesehatan, pertahanan, energi, dan infrastruktur penting lainnya. Dengan semakin kompleks dan terhubungnya infrastruktur digital kita, kesulitan mencapai keamanan aplikasi meningkat secara eksponensial. Open Web Application Security Project (OWASP) yang merupakan komunitas terbuka yang didedikasikan untuk memungkinkan organisasi mengembangkan, membeli, dan memelihara aplikasi yang dapat dipercaya. Di OWASP sendiri, anda akan menemukan free and open…
• Tool dan standar keamanan aplikasi
• Buku tentang uji keamanan aplikasi, pengembangan kode aman, dan review kode keamanan
• Kendali keamanan dan pustaka standar
• Cabang lokal di seluruh dunia
• Riset terkini
• Konferensi lengkap di seluruh dunia
• Mailing list
• Dan banyak lagi … di www.owasp.org
Kali ini OWASP akan membahas :
- "Operationalizing Threat Intelligence with Automation and Collaboration
Abstrack:
For defenders in the current situation, Threat Intel is all about IOCs which are more technical in nature and covers aspects that have a very short lifespan. By the time controls are put in place to thwart the technical IOCs, attackers change it and counter with new attacks. So, it becomes essential for defenders to continuously automate the Threat Intelligence actioning and harness the tactical information as well used by attackers and have countermeasures in place.
By automating Threat Intel collection, analysis, and dissemination, we can deduce predictive intelligence providing greater visibility to the organizations while allowing them to anticipate and counter threats even before they attack. We will discuss how end-to-end threat intelligence automation in a closed trusted sharing environment could be used to operationalize actionable and relevant predictive intelligence by correlating, enriching, and analyzing threat data collected in real-time from a wide range of external and internal sources over a hub and spoke sharing model. We will also cover advanced automation strategies for the full threat intelligence lifecycle while detailing how mutual threat sightings could be used to identify and prioritize threats with precision confidence.
High Level Agenda for Presentation
Collective Defense Vs Passive Defense Vs Active Defense
Threat Intelligence and Its types
Threat Intelligence Operationalisation
Threat Intelligence Automation / Orchestration
Threat Intelligence Collaboration
Collective Defense
Takeaways
---
Short bio :
Avkash K
VP - Research and Innovation at Cyware Labs
Information Security professional with overall 12+ years of experience in Information Security domain. Currently heading Research and Innovation in Cyber Fusion and Threat Intelligence domain within security product company Cyware Labs. Also Null Mumbai(Open security community) Chapter Leader.
Experienced in SOC/CSIRT Management,Cyber Fusion, Cyber Resiliency, Threat Hunting, Threat Intelligence and research, Enterprise Security Architecture, Network Security management.
Waktu dan Tempat :
26th September 10:30 - 11:30 WIB
Catatan :
- Peserta online menggunakan aplikasi Zoom di komputer / laptop / tablet / smartphone
- Acara ini free for everyone
- Password untuk join meeting akan dikirim kan kepeserta setelah register
Venue :
Online by zoom
Support our Conference
OWASP AppSec Indonesia 2020

Operationalizing Threat Intelligence with Automation and Collaboration