Understanding and Applying Threat Intelligence | 05
Katie Nickels talks about what threat intelligence is, where to get it, what you should expect from it, and how the SOC should be using it.
Support for the Blueprint podcast comes from the SANS Institute.
If you like the topics covered in this podcast and would like to learn more about blue team fundamentals such as host and network data collection, threat detection, alert triage, incident management, threat intelligence, and more, check out my new course SEC450: Blue Team Fundamentals.
This course is designed to bring attendees the information that every SOC analyst and blue team member needs to know to hit the ground running, including 15 labs that get you hands on with tools for threat intel, SIEM, incident management, automation and much more, this course has everything you need to launch your bue team career.
Check out the details at sansurl.com/450! Hope to see you in class!
Follow SANS Cyber Defense: Twitter | LinkedIn | YouTube
Follow John Hubbard: Twitter | LinkedIn
Katie is the Principal Intelligence Analyst for Red Canary. She has worked on cyber threat intelligence (CTI), network defense, and incident response for nearly a decade for the DoD, MITRE, Raytheon, and ManTech.
Katie also serves as an instructor for the SANS FOR578: Cyber Threat Intelligence course, enabling her to share her passion for CTI more broadly. "Early on in my own career, I took SANS SEC401: Security Essentials Bootcamp with Dr. Eric Cole, and learning from his insights helped shape the entire course of my career," Katie says. Now as a SANS instructor, she hopes to provide the same career-shaping support for her students.
Qualifications Summary
Get to Know Katie Nickels
Follow Katie Nickels on Twitter (@likethecoins) and LinkedIn (/in/katie-nickels-631a044).