| Title | : | Cyber Threat Intelligence Workshop |
| Duration | : | 01:47:02 |
| Viewed | : | 266 |
| Published | : | 25-03-2025 |
| Source | : | Youtube |
In this conversation, Corey Nenno discusses the intricacies of the Cyber Threat Intelligence (CTI) process, emphasizing its importance in modern cybersecurity. He outlines the evolution of CTI, the various frameworks and models that support it, and the proactive nature of threat intelligence in protecting organizations. Corey also addresses the challenges faced by professionals in the field and provides insights on transitioning into a CTI role, highlighting the significance of mentorship and collaboration within the cybersecurity community. Takeaways Cyber Threat Intelligence (CTI) is essential for modern cybersecurity. CTI involves gathering, analyzing, and applying information from cyber events. Understanding threat actors as businesses is crucial for effective CTI. Proactive measures in CTI can significantly enhance an organization's security posture. Frameworks like MITRE ATT&CK are vital for structuring CTI efforts. Collaboration and sharing information within the cybersecurity community is key. Transitioning into CTI roles is possible with the right experience and mentorship. AI and automation are shaping the future of CTI processes. Effective reporting and metrics are essential for demonstrating the value of CTI. Continuous learning and seeking mentorship are important for career growth in cybersecurity. 00:00 Intro to CTI 01:43 CTI Basics 06:59 Corey's Background 12:03 The Military and Intelligence 20:18 Hacking is a Business Now 28:52 Automation and Tools in CTI 36:50 CTI Frameworks 41:54 CTI Integration with Cybersecurity Tools 55:39 Log4J Lessons Learned 01:07:06 Malware Analysis and CTI 01:10:47 The Cyber Threat Intelligence Process 01:23:41 The Future of CTI 01:31:45 Leadership and CTI 01:42:25 GRC, Penetration Testing, and the Crossover with CTI 01:43:44 STIX and TAXII keywords Cyber Threat Intelligence, CTI Process, Cybersecurity, Threat Actors, Risk Management, AI in Cybersecurity, Cybersecurity Frameworks, Cybersecurity Careers, Cybersecurity Tools, Cybersecurity Training
![]() |
Wannacry Autopsy: My Journey into Malware Rever... 52:50 - 0 |
![]() |
Phishing Prevention and Analysis Workshop 33:19 - 0 |
![]() |
TLS and Certificates Workshop 39:06 - 0 |
![]() |
Day 3 Keynote & Morning 34:44 - 0 |
![]() |
Always a Work in Progress | A Self Improvement ... 37:34 - 0 |
![]() |
Fortifying Active Directory: A Security Profess... 27:54 - 0 |
![]() |
“Rrezikon të arratiset”, GJKKO sqaron masa... 10:22 - 0 |
![]() |
'SHKARKOHET' Balluku/ Revoltohet ANALISTI: Nis ... 15:53 - 0 |


