This repository is a collection of useful links pointing to threat intelligence talks, courses, books or any other topic where threat intelligence can help your organizastion or your team when analyzing threats or groups.
| Link | Title | Watched |
|---|---|---|
| https://www.youtube.com/watch?v=-1ygjCFTWps | Mark Your Calendars: Why Dates Matter to Adversaries | yes |
| https://www.youtube.com/watch?v=PKc4sr5yCXA | Integrated Intelligence | |
| https://www.youtube.com/watch?v=Qm5uLzphP3g | The Joy of Threat Landscaping | |
| https://www.youtube.com/watch?v=_AN2XrtsdlI | Quantifying Intelligence: Increasing Executives IQ | |
| https://www.youtube.com/watch?v=ea50SyPBDBo | DFIR Summit 2016: Leveraging Cyber Threat Intelligence in an Active Cyber Defense | |
| https://www.youtube.com/watch?v=_84eA4jQOec | Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit 2016 | |
| https://www.youtube.com/watch?v=ckVZWxz7C8M | Integrating Cyber Threat Intelligence using Classic Intel Techniques - CTI SUMMIT 2017 | |
| https://www.youtube.com/watch?v=F-MYBVINkKs | Building Strategic Return on Investment Through Cyber Intelligence | |
| https://www.youtube.com/watch?v=3CUNlgQBwc4 | Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats | |
| https://www.youtube.com/watch?v=IETRHdMejaw | We’re in Now, Now: The Tyranny of Current Intelligence and How to Manage It | |
| https://www.youtube.com/watch?v=KJIqgQKoHYg | Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020 | |
| https://www.youtube.com/watch?v=cn-O8NDlwZs | Threat Actor of in-Tur-est: Unveiling Balkan Targeting | |
| https://www.youtube.com/watch?v=h076AA1ZroY | Hunting and Scoping A Ransomware Attack | |
| https://www.youtube.com/watch?v=J7e74QLVxCk | The Cycle of Cyber Threat Intelligence | yes |
| https://www.youtube.com/watch?v=1BBw9GO7g74 | Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit | |
| https://www.youtube.com/watch?v=jzHw8lkocXA | Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017 | |
| https://www.youtube.com/watch?v=E4oJdOhLEnU | Leveraging Curiosity to Enhance Analytic Technique - SANS Cyber Threat Intelligence Summit 2018 | |
| https://www.youtube.com/watch?v=USQL8w8EOzM | Unsolved Mysteries – Revisiting the APT Cold Case Files - SANS CTI Summit 2019 | |
| https://www.youtube.com/watch?v=ea50SyPBDBo | DFIR Summit 2016: Leveraging Cyber Threat Intelligence in an Active Cyber Defense | |
| https://www.youtube.com/watch?v=kNv2PlqmsAc | Survival Heuristics: My Favorite Techniques for Avoiding Intelligence Traps - SANS CTI Summit 2018 | |
| https://www.youtube.com/watch?v=ixfaaVd4rlY | Information Anarchy: A Survival Guide for the Misinformation Age - SANS CTI Summit 2018 | |
| https://www.youtube.com/watch?v=II35Yh_E7ao | Did I do that? - Understanding action & artifacts w/ Matthew Seyer & David Cowen - SANS DFIR Summit | |
| https://www.youtube.com/watch?v=6NmMPJ0OIls | Common misconceptions and mistakes made in Threat Hunting | |
| https://www.youtube.com/watch?v=MBVxaE9oaMQ | MITRE ATT&CKcon 2018: 5 Ways to Screw Up Your Security Program with ATT&CK | |
| https://www.youtube.com/watch?v=YhsN5pBDrGY | MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK | |
| https://www.youtube.com/watch?v=bkfwMADar0M | Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels | |
| https://www.youtube.com/watch?v=GjquFKa4afU | Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018 | |
| https://www.youtube.com/watch?v=qg-zK2zv4ng | How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017 | |
| https://www.youtube.com/watch?v=hAsKp43AZmM | MITRE ATT&CKcon 2.0: How a Threat Hunting Team Has Upgraded Its Use of ATT&CK | |
| https://www.youtube.com/watch?v=XpuAnF5TLVA | Measure What Matters: How to Use ATT&CK to Do the Right Things in the Right Order | |
| https://www.youtube.com/watch?v=gmqs10b97jw | ATT&CK-Onomics: Exploring The Economics Behind Techniques Used By Adversaries | |
| https://www.youtube.com/watch?v=3R3cwP3yFK4 | Helping Small Companies Leverage CTI with an Open Source Threat Mapping | |
| https://www.youtube.com/watch?v=IWA0T-GpQDk | From Theory To Practice: How My ATT&CK Perspectives Have Changed | |
| https://www.youtube.com/watch?v=9nUNuwiN52s | Sharpening Your Threat Hunting Program with ATT&CK Framework | |
| https://www.youtube.com/watch?v=xbnSuKTMkKo | Using ATT&CK To Create Cyber DBTs For Nuclear Power Plants | |
| https://www.youtube.com/watch?v=70pR0Er2s5c | Mapping The Eventbot Mobile Banking Trojan With MITRE ATT&CK For Mobile | |
| https://www.youtube.com/watch?v=f1E6bquRxlA | ATT&CKing The Cloud: Hopping Between The Matrices | |
| https://www.youtube.com/watch?v=dEORNlCS7xc | Building Detections For Cloud With Kql and ATT&CK | |
| https://www.youtube.com/watch?v=M_uG_hlmTcA | Putting the PRE into ATT&CK | |
| https://www.youtube.com/watch?v=z2R0oc70lc8 | Starting Over with Sub-Techniques: Lessons Learned Remapping Detection Analytics | |
| https://www.youtube.com/watch?v=WJz6zXJ0ABs | Using MITRE PRE-ATT&CK and ATT&CK In Cybercrime Education and Research | |
| https://www.youtube.com/watch?v=07YoerY050I | Without Attacking: Transforming Adversary Emulations Into A Data Analysis Question | |
| https://www.youtube.com/watch?v=CNTAK54JxrI | Ta505 - A Study of High End Big Game Hunting In 2020 | |
| https://www.youtube.com/watch?v=hAsKp43AZmM | MITRE ATT&CKcon 2.0: How a Threat Hunting Team Has Upgraded Its Use of ATT&CK | |
| https://www.youtube.com/watch?v=t6joWR3mqDk | MITRE ATT&CKcon 2.0: ATT&CK Updates – CAR and Analytics | |
| https://www.youtube.com/watch?v=z47g13s2xVA | MITRE ATT&CKcon 2.0: The World’s Most Dangerous ATT&CKers | |
| https://www.youtube.com/watch?v=IKogtrsN214 | MITRE ATT&CKcon 2.0: Threat-Informed Defense: Where do we go from here? | |
| https://www.youtube.com/watch?v=iayII8CCGUI | MITRE ATT&CKcon 2.0: attckr: Toolkit of ATT&CK Incident Data for Service Providers & Organizations | |
| https://www.youtube.com/watch?v=V--wxuSEMD0 | MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities | |
| https://www.youtube.com/watch?v=XVGXfFcUvYc | MITRE ATT&CKcon 2.0: Tell Tall Tales with ATT&CK! | yes |
| https://www.youtube.com/watch?v=bWB6qWoFT_M | MITRE ATT&CKcon 2.0: From Susceptible to ATT&CK: A Threat Hunting Story | |
| https://www.youtube.com/watch?v=vIxqd0Qt_D8 | MITRE ATT&CKcon 2.0: AMITT: ATT&CK-based Standards for Misinformation Threat Sharing | |
| https://www.youtube.com/watch?v=LydtAdCL114 | MITRE ATT&CKcon 2.0: Lessons in Purple Teaming with ATT&CK | |
| https://www.youtube.com/watch?v=v5CoPkeVQCI | MITRE ATT&CKcon 2.0: Flashback with ATT&CK - Exploring Malware History with ATT&CK (2003-2018) | yes |
| https://www.youtube.com/watch?v=AsSAsBdkns0 | MITRE ATT&CKcon 2.0: Raiders of the MITRE Framework: How to Build Your Own Threat Library | |
| https://www.youtube.com/watch?v=n_6f_FKEzxo | DeadRinger: Three APTs Walk into a Bar | |
| https://www.youtube.com/watch?v=ho_rAgKXCss | ATT&CK™ Your CTI w/ Lessons Learned from 4 Years in the Trenches | |
| https://www.youtube.com/watch?v=N1ZmFYlNlR8 | HackInBo® Winter Edition 2019 "Evoluzione degli APT attraverso la supply chain" | |
| https://www.youtube.com/watch?v=T9WV_sr_2qk | BHIS: How To Use Threat Intelligence |