Skip to content

Operationalizing Threat Intelligence with Automation and Collaboration

Photo of OWASP Indonesia
Hosted By
OWASP I. and Vina P.
Operationalizing Threat Intelligence with Automation and Collaboration

Details

Software yang tidak aman telah mengancam infrastruktur keuangan, kesehatan, pertahanan, energi, dan infrastruktur penting lainnya. Dengan semakin kompleks dan terhubungnya infrastruktur digital kita, kesulitan mencapai keamanan aplikasi meningkat secara eksponensial. Open Web Application Security Project (OWASP) yang merupakan komunitas terbuka yang didedikasikan untuk memungkinkan organisasi mengembangkan, membeli, dan memelihara aplikasi yang dapat dipercaya. Di OWASP sendiri, anda akan menemukan free and open…
• Tool dan standar keamanan aplikasi
• Buku tentang uji keamanan aplikasi, pengembangan kode aman, dan review kode keamanan
• Kendali keamanan dan pustaka standar
• Cabang lokal di seluruh dunia
• Riset terkini
• Konferensi lengkap di seluruh dunia
• Mailing list
• Dan banyak lagi … di www.owasp.org

Kali ini OWASP akan membahas :

  1. "Operationalizing Threat Intelligence with Automation and Collaboration

Abstrack:
For defenders in the current situation, Threat Intel is all about IOCs which are more technical in nature and covers aspects that have a very short lifespan. By the time controls are put in place to thwart the technical IOCs, attackers change it and counter with new attacks. So, it becomes essential for defenders to continuously automate the Threat Intelligence actioning and harness the tactical information as well used by attackers and have countermeasures in place.

By automating Threat Intel collection, analysis, and dissemination, we can deduce predictive intelligence providing greater visibility to the organizations while allowing them to anticipate and counter threats even before they attack. We will discuss how end-to-end threat intelligence automation in a closed trusted sharing environment could be used to operationalize actionable and relevant predictive intelligence by correlating, enriching, and analyzing threat data collected in real-time from a wide range of external and internal sources over a hub and spoke sharing model. We will also cover advanced automation strategies for the full threat intelligence lifecycle while detailing how mutual threat sightings could be used to identify and prioritize threats with precision confidence.

High Level Agenda for Presentation

Collective Defense Vs Passive Defense Vs Active Defense

Threat Intelligence and Its types

Threat Intelligence Operationalisation

Threat Intelligence Automation / Orchestration

Threat Intelligence Collaboration

Collective Defense

Takeaways

---
Short bio :
Avkash K
VP - Research and Innovation at Cyware Labs

Information Security professional with overall 12+ years of experience in Information Security domain. Currently heading Research and Innovation in Cyber Fusion and Threat Intelligence domain within security product company Cyware Labs. Also Null Mumbai(Open security community) Chapter Leader.

Experienced in SOC/CSIRT Management,Cyber Fusion, Cyber Resiliency, Threat Hunting, Threat Intelligence and research, Enterprise Security Architecture, Network Security management.

Waktu dan Tempat :
26th September 10:30 - 11:30 WIB

Catatan :

  • Peserta online menggunakan aplikasi Zoom di komputer / laptop / tablet / smartphone
  • Acara ini free for everyone
  • Password untuk join meeting akan dikirim kan kepeserta setelah register

Venue :
Online by zoom

Support our Conference
OWASP AppSec Indonesia 2020

Photo of OWASP Jakarta Chapter group
OWASP Jakarta Chapter
See more events