Untitled

Untitled

Untitled

Bridging the intelligence divide: building cti blueprints for value-based production

Keynote

0 to cti

beyond the basics: the role of llm in modern threat intel

Clustering Attacker Behavior: Connecting the Dots in the RAAS ecosystem

OSINTer: Automating the CTI Heavy Lifting the Open Source Way!

Beyond Cryptojacking: Studying Contemporary Malware in the Cloud

Exernal Partnerships: How an Information Sharing Analysis Center Works With its Members to Improve Cyber Defenses for Their Sector

How to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise Approach

Slow Cooking and Cyber Threat Intelligence: Cooking a High-Performing Team

Let’s Be Honest About MITRE ATT&CK Mappings and the “So What?”

Revisiting the Indicator: Towards a Threat Intelligence Ontology

Navigating the Digital Battlefield: A Framework for Geopolitical Cyber Risk Assessment