Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Red Canary's Strategy for Naming the Threats We Track

Red Canary via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about Red Canary's systematic approach to naming and tracking cybersecurity threats in this 32-minute Office Hours episode featuring Alex Berninger, Senior Manager of Intelligence. Discover the complex challenges organizations face when multiple security companies create different names for the same threat actors due to seeing different pieces of activity. Explore Red Canary's methodology for threat clustering, starting with temporary 'egg' designations for new activity that evolve into color-bird naming conventions. Understand the strategic balance between creating new threat names versus adopting existing industry nomenclature, and how effective stakeholder communication influences these decisions. Examine how attribution priorities vary across organizations and why Red Canary emphasizes actionable intelligence focused on 'how' threats operate and 'what next' steps to take rather than deep attribution analysis. The session also includes cybersecurity news updates covering the new OWASP Top Ten draft and the resurgence of Qbot loader campaigns, providing current context for threat landscape developments.

Syllabus

00:00 - 00:41: Intro
00:42 - 02:27: Welcome to Red Canary Office Hours
0:2:28 - 04:50: In the news: New OWASP Top 10
04:51 - 07:12: In the news: Gootloader is back
07:13 - 31:39: How Red Canary names and tracks threats

Taught by

Red Canary

Reviews

Start your review of Red Canary's Strategy for Naming the Threats We Track

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.