Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast

Subscribers:
64,099
Published on ● Video Link: https://www.youtube.com/watch?v=ff1yhdIx0yY



Category:
Guide
Duration: 58:23
1,741 views
37


Cozy Bear or APT29? Carbanak or FIN7? Lazarus or HIDDEN COBRA? For years, analysts have been frustrated by different threat group naming conventions. Efforts at creating a unified naming systemor even a Rosetta Stone for existing nameshave proven futile in the face of subtle but important differences.

In this webcast, Katie Nickels will help you make order of the naming chaos in a way that will also improve your analysis methodology. She will help you understand why there are so many names and why it's okay that we don't agree on them. You'll learn a practical approach for how to track names, decide when to name your own groups or default to existing names, and how to keep things clear while not contributing to the confusion. Katie will end with a call for action on how we can better communicate publicly about groups, so we don't make this a bigger mess than it already is.

Speaker Bio
Katie Nickels

Katie (@likethecoins) is the Principal Intelligence Analyst for Red Canary. She has worked on cyber threat intelligence (CTI), network defense, and incident response for nearly a decade for the U.S. Department of Defense (DoD), MITRE, Raytheon, and ManTech. She also serves as an instructor for the SANS FOR578: Cyber Threat Intelligence course, enabling her to share her passion for CTI more broadly. Katie hosts SANS Threat Analysis Rundown (STAR), a popular monthly webcast series that discusses the current threat landscape and cyber threats. She is also the Program Manager at Cyberjutsu Girls Academy (CGA), a program for teenage girls that seeks to inspire exploration and learning in cybersecurity and STEM.




Other Videos By SANS Institute


2021-02-02Cracking the Mystery: Quantum Cryptography and The Future of Cybersecurity
2021-02-02Cybersecurity is Like Ice Cream. There Are a Whole Lot of Flavors
2021-02-02Can People Hack Nuclear Plants?
2021-01-27Data Protection Day 2021
2021-01-26Data Privacy Day 2021
2021-01-21A Recap from Chris Krebs's Keynote - SANS Cyber Threat Intelligence 2021
2021-01-12SANS Virtual Summits Will Be FREE for the Community in 2021
2020-12-18SANS Security Awareness – Secure the Holidays
2020-12-16Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst
2020-12-14SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack
2020-12-07Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast
2020-12-03SANS Foundations - What's James Lyne's favorite part of the new course - Interview with the author
2020-12-03SANS Foundations - How do you balance theory and practical? - An Interview with James Lyne
2020-12-03SANS Foundations - How did you pick the course topics? An interview with the Author, James Lyne
2020-11-23SANS Foundations overview by course author James Lyne
2020-11-18Becoming a CISO: Leading Transformation
2020-11-18SANS Cyber Security Foundations Course
2020-11-12New Five Day Security Culture Course | MGT521 | SANS Institute
2020-11-06Good on Paper: Packaging Your Skills and Experience (Panel)
2020-11-04Authentic at Work: Bringing Your Whole Self to Work in Infosec & Tech | Christina Morillo
2020-11-03You Got a Job in Cybersecurity!... Now What?! (Panel)



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
star webcast
sans threat analysis rundown
katie nickels
threat hunting
threat intelligence