Advanced Techniques in Data Visualization - Self Paced Online
Get 20% off all career paths from fullstack to AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to automate the creation of cybersecurity battlecards from Cyber Threat Intelligence (CTI) reports through this 25-minute conference talk from DEF CON 33's Recon Village. Discover techniques for streamlining the process of converting raw threat intelligence data into actionable battlecards that security teams can use for rapid threat response and decision-making. Explore the development and implementation of CTI agents that can automatically parse, analyze, and format threat intelligence reports into structured battlecard formats. Gain insights into the challenges of manual battlecard creation and how automation can improve efficiency, consistency, and speed in threat intelligence operations. Understand the practical applications of automated battlecard generation in real-world cybersecurity environments and learn about the tools and methodologies that can enhance your organization's threat intelligence capabilities.
Syllabus
DEF CON 33 Recon Village - CTI Agent Automated Battlecards from CTI Reports - Mohamed Nabeel
Taught by
DEFCONConference