Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to automate the creation of cybersecurity battlecards from Cyber Threat Intelligence (CTI) reports through this 25-minute conference talk from DEF CON 33's Recon Village. Discover techniques for streamlining the process of converting raw threat intelligence data into actionable battlecards that security teams can use for rapid threat response and decision-making. Explore the development and implementation of CTI agents that can automatically parse, analyze, and format threat intelligence reports into structured battlecard formats. Gain insights into the challenges of manual battlecard creation and how automation can improve efficiency, consistency, and speed in threat intelligence operations. Understand the practical applications of automated battlecard generation in real-world cybersecurity environments and learn about the tools and methodologies that can enhance your organization's threat intelligence capabilities.
Syllabus
DEF CON 33 Recon Village - CTI Agent Automated Battlecards from CTI Reports - Mohamed Nabeel
Taught by
DEFCONConference