Webinar: Intelligence-driven Threat Hunting for improving SOC maturity level
Cyber Threat Modeling enhances SOC maturity by enabling intelligence-driven threat hunting, systematically identifying and mitigating advanced threats through proactive analysis of attack vectors and adversary tactics.
Table of Content
- 1. Problem statement
- 2. The business problem
- 3. SOC finding - Partly cause of the problem
- 4. SIEM use case problem
- 5. Incident Response challenges
- 6. Outlook into a modern future
- 7. Knowing yourself and your enemy
- 8. Cyber Threat Modelling
- 9. Attack graphs
- 10. Attack trees
- 11. Four levels of Threat Intelligence
- 12. State-of-the-art technology, frameworks and methodologies
- 13. SANS 6-step Incident Response
- 14. The Diamond Model of Intrusion Analysis
- 15. MITRE ATT&CK phase-ordered kill chain
- 16. TIBER-EU
- 17. Intelligence Preparation of the Cyber Environment
- 18. Structured Threat Information Expression (STIX)
Speaker: Rukhsar Khan
Abstract:
In the rapidly evolving landscape of cyber threats, Security Operations Centers (SOCs) face mounting challenges in maintaining proactive defence mechanisms. This session explores the critical business problem of SOC inefficiencies, stemming from gaps in SIEM use cases, suboptimal threat modelling, and incident response limitations. By addressing these shortcomings, the discussion transitions into a forward-looking perspective, envisioning a modernized SOC equipped with intelligence-driven capabilities.
Watch Video: