Artwork

Content provided by CERIAS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CERIAS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Sam Liles, "Threat intelligence and digital forensics"

 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on January 12, 2017 15:24 (7+ y ago). Last successful fetch was on September 14, 2016 19:32 (7+ y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 50661429 series 39330
Content provided by CERIAS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CERIAS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
There are various forms and types of intelligence but this topic isn?t about how smart you are. It is about how smart you are in figuring out the risks and various impacts against your organization. How do you use digital forensics to determine an adversary within the network. Starting with a small primer on the tradecraft of intelligence the discussion covers how threat intelligence to information enterprises is impacted on the tactical, operational, and strategic level.
  continue reading

322 episodes

Artwork
iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on January 12, 2017 15:24 (7+ y ago). Last successful fetch was on September 14, 2016 19:32 (7+ y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 50661429 series 39330
Content provided by CERIAS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CERIAS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
There are various forms and types of intelligence but this topic isn?t about how smart you are. It is about how smart you are in figuring out the risks and various impacts against your organization. How do you use digital forensics to determine an adversary within the network. Starting with a small primer on the tradecraft of intelligence the discussion covers how threat intelligence to information enterprises is impacted on the tactical, operational, and strategic level.
  continue reading

322 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide