ElevenPaths Talks


Detecting threat with intelligence (Threat Intelligent)

September 6, 2018. In this webinar we are going to focus into the concept of Threat Intelligent, which tools are used, the methodology and colaborations levels, and more. If you want to be threat detection expert, don’t miss out this #11PathsTalks.

11Paths Talks: Detecting threat with intelligence

Something Strange Happens in my Network
Something Strange Happens in my Network CSA team & guests June 14, 2018
How to Protect myself in the Cloud?
How to Protect myself in the Cloud? CSA team & guests July 5, 2018
The Art of Deception
The Art of Deception CSA team & guests August 9, 2018
Detecting threats with intelligent
Detecting threats with intelligent CSA team & guests September 6, 2018
Wifi Network Security
Wifi Network Security CSA team & guests October 4, 2018
Privileged Identity Management
Privileged Identity Management CSA team & guests November 1, 2018
Mobile Device Security Management
Mobile Device Security Management CSA team & guests December 6, 2018

Threat Intelligent concept is often very controversial in the security market. It creates confusión in how it is defined, what it specifically encompasses, what is the relation with Indicators of Commitment (IoC), to name but a few. In this session, we are going to explain who the relevant actors are, wich tools they use, what formats and standards are the most common, what methodologies and levels of collaboration they use, if is necessary to need a public organizations, and if is posible to cooperate with them from a private environment.

For this reason, all providers have a wide and complete variety of security solutions, which include but are not limited to: access control, audit records, profiling of users and roles, levels of authorization, digital certificates, encryption and so on, with which they are able to guarantee the security of the services that we upload to the cloud.

Find out more about this subject:

ElevenPaths Talks: Something strange happens in my network