We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Threat Intelligence Analyst

Search

Clear Expand Collapse

Acquiring & Using Threat Intelligence in OT Environments

Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.

Price
Course duration Duration: 25 minutes

AI-Powered SOC and Threat Intelligence

Learn about cutting edge trends in AI-Powered SOCs today!

Price
Course duration Duration: 45 minutes

Boosting Discovery & Visibility for Operational Resilience

Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.

Price
Course duration Duration: 25 minutes

Demystifying Modern Fraud Attacks in Banking

Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.

Price
Course duration Duration: 30 minutes

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Price
Course duration Duration: 25 minutes

How Things Are Going for APT41 in 2024

Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.

Price
Course duration Duration: 30 minutes

Insider Risk in the Era of Work From Anywhere

Join Patrick Benoit, Brian Kelley, and Fred Kwong as they address the shift from perimeter-centric security to mitigating insider risks in secure remote work.

Price
Course duration Duration: 32 minutes

Is New U.S. National Cybersecurity Strategy Viable?

Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?

Price
Course duration Duration: 25 minutes

Microsoft Sentinel Skills

Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.

Course duration Duration: 8 hours

Multiplying Threat Intelligence

John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.

Price
Course duration Duration: 35 minutes

Preventing Breaches with the SASE Model

Jonathan Andresen, Senior Director, Marketing and Products, Asia Pacific and Japan, Bitglass examines the shift to Secure Access Service Edge (SASE) architecture in response to evolving cyber threats like the SolarWinds breach. Learn about modern breach trends, SASE's key pillars, and the cost-benefit analysis of SASE protection versus data breaches.

Course duration Duration: 14 minutes

The Advent of the OT SOC

WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.

Price
Course duration Duration: 15 minutes

Trust No File: Protection Against File-Borne Malware

Avinash Narasimhan explores strategies to secure file transfers, a critical yet vulnerable aspect of business operations. Learn to combat threats with layered protection, deep CDR technology in a zero trust framework, and next-gen sandboxing tools to safeguard files in transit and at rest.

Course duration Duration: 21 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement