Dr. Erdal Ozkaya
Search
  • Home
  • Cybersecurity, Free Events, Announcemets, Siber Güvenlik
  • Cryptolocker and Incident Response – Free Webinar 3/6/21 :

Cryptolocker and Incident Response – Free Webinar 3/6/21 :

Cryptolocker and Incident Response Bir Saldırının Anatomisi: Cryptolocker
Erdal2023-05-10T16:35:42-04:00

Cryptolocker and Incident Response

This webinar will be hosted by Turkeys biggest IT Community Cozum Park in Turkish

Bir Saldırının Anatomisi: Cryptolocker

Son zamanlarda COVID-19 pandemi salgını nedeniyle evden ve uzaktan çalışma zorunluluğuna en fazla sevinenler hiç şüphesiz siber saldırganlar oldu. Özellikle siber güvenlik konusunda gerekli ve yeterli önlemleri almayan KOBİ’lere saldıran siber korsanlar önce sistemlere sızdılar ve daha sonra sistemdeki tüm verileri erişilmez hale getirdiler. Daha sonra ise astronomik miktarda Bitcoin olarak fidye talep ettiler.

Yaşadığımız olay müdahalelerinde saldırganların izini sürdük ve bu saldırıları nasıl planlayıp ne şekilde sonuca ulaştırdıklarını tek tek tespit edip ortaya çıkardık. Bu saldırıların kurbanı olmamak için nelere dikkat etmeliyiz? Ne tür tedbirler almalıyız? Konunun uzmanları olarak bu etkinliğimizde tüm detayları sizlerle paylaşacağız.

 

ETKİNLİK TARİHİ VE SAATİ

03.06.2020 14:00 – 03.06.2020 15:00

  ETKİNLİK YERİ

Online / Istanbul / Turkey

  KONUŞMACILAR

Erdal Özkaya , Raif Sarıca , Şükrü Durmaz

ETKİNLİK HAKKINDA BİLGİ ALMAK İÇİN

E-posta

[email protected]

Telefon

08508001484

Twitter Hashtag

#cozumparkwebcast

Websitesi

https://etkinlik.cozumpark.com

For more evets :

https://www.erdalozkaya.com/category/free-events/

Cryptolocker and Incident Response – Free Webinar 3/6/21 :

About Practical Cyber Threat Intelligence

Table of Contents

  • About Practical Cyber Threat Intelligence
  • KEY FEATURES  
  • DESCRIPTION 
  • HOW TO ORDER THE BOOK
  • WHAT YOU WILL LEARN
  • WHO IS THIS BOOK FOR?
  • Table of Contents
  • About Dr Erdal Ozkaya (author)

Knowing your threat actors together with your weaknesses and the technology will master your defense

KEY FEATURES  

  • Gain practical experience with cyber threat intelligence by using the book’s lab sections.
  • Improve your CTI skills by designing a threat intelligence system.
  • Assisting you in bridging the gap between cybersecurity teams.
  • Developing your knowledge of Cyber Intelligence tools and how to choose them.

DESCRIPTION 

When your business assets are threatened or exposed to cyber risk, you want a high-quality threat hunting team armed with cutting-edge threat intelligence to build the shield. Unfortunately, regardless of how effective your cyber defense solutions are, if you are unfamiliar with the tools, strategies, and procedures used by threat actors, you will be unable to stop them.

This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information.

The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause.

HOW TO ORDER THE BOOK

Amazon: Click Here

BPB Online: Click Here

You can also find the book in Google – Apple Books and select bookstores

WHAT YOU WILL LEARN

  • Hands-on experience in developing a powerful and robust threat intelligence model.
  • Acquire the ability to gather, exploit, and leverage adversary data.
  • Recognize the difference between bad intelligence and good intelligence.
  • Creating heatmaps and various visualization reports for better insights.
  • Investigate the most typical indicators of security compromise.
  • Strengthen your analytical skills to understand complicated threat scenarios better.

WHO IS THIS BOOK FOR?

The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly.

Table of Contents

  1. Basics of Threat Analysis and Modeling
  2. Formulate a Threat Intelligence Model
  3. Adversary Data Collection Sources & Methods
  4. Pivoting Off and Extracting Adversarial Data
  5. Primary Indicators of Security Compromise
  6. Identify & Build Indicators of Compromise
  7. Conduct Threat Assessments in Depth
  8. Produce Heat Maps, Infographics & Dashboards
  9. Build Reliable & Robust Threat Intelligence System
  10. Learn Statistical Approaches for Threat Intelligence
  11. Develop Analytical Skills for Complex Threats
  12. Planning for Disaster
BPB Online Promoting the book
BPB Online CTI Dr Erdal Ozkaya

About Dr Erdal Ozkaya (author)

Named among Top 50 Technology Larders by IDC and CIO Online, Dr. Ozkaya is working with an ardent passion for raising cyber awareness and leveraging new and innovative approaches.

Currently he is the CISO of Comodo Cybersecurity, where he came from Standard Chartered Bank, and was the Regional Chief Information Security Officer and Managing Director Before Standard Chartered Bank, he was a Trusted Security Advisor and Cybersecurity Architect at Microsoft, where he perfected the art of mapping customer business problems to technology solutions.

He remains committed to delivering accurate, accessible resources to inform individuals and organizations of cybersecurity and privacy matters in the internet age.

Dr. Ozkaya is a collaborative team leader with expertise spanning end-to-end IT solutions, management, communications, and innovation. He is a well-known public speaker, an award-winning technical expert, author, and creator of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, and other expert-level vendors.

LinkedIn Profile: Dr. Erdal Ozkaya

Blog Link: www.erdalozkaya.com

Keywords

What is Cyber Threat Intelligence?

What is Threat Modeling?

BPB Online CTI

Practical Cyber Threat Intelligence

How to Formulate a Threat Intelligence Model

practical cyber threat intelligence pdf –  practical cyber security – practical cyber threat intelligence gather – actor motives targets and attacks – What are four types of cyber threat intelligence? – What are the key concepts of cyber threat intelligence?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

SECON NJ

SECON New Jersey 2023 – Register for Free

SECON New Jersey 2023 I am thrilled to announce that I will be speaking at this years (ISC)2 New Jersey Chapter conference,... read more
enterprise it world mea

UAE Banks Enhances Cyber Security Posture by Emphasizing on User Education

UAE Banks Enhances Cyber Security Posture by Emphasizing on User Education “It’s really important to educate the employees and communicate about... read more
Getting Started in Cybersecurity by Dr Erdal Ozkaya

Getting Started in Cybersecurity – New B00K

Getting Started in Cybersecurity This book is a guide for you on everything you should know about cybersecurity. The book helps... read more
Incident response with Microsoft Azure

Incident response with Microsoft Azure – Superior Guide to 1R

Incident response in the cloud As we've already learned, an incident is a service disruption that impacts your customers and end users,... read more
Sosyal Mühendislik Ayaküstü Sohbetler

Sosyal Mühendislik Ayaküstü Sohbetler

Sosyal Mühendislik Ayaküstü Sohbetler This post will be in Turkish about our new "Social Engineering " book :) Türkiye Siber Güvenlik Kümelenmesi... read more
Dr Erdal Ozkaya Microsoft Ignite

MENA REGTEC Forum 21 -Registration is Free

MENA REGTEC Forum I am speaking at the “MENA REGTEC Forum” on 18th and 19th January 2021 from 10.00 AM to... read more
GISEC Dubai Dr Erdal Ozkaya

GISEC Dubai 2020 – get your FREE pass

GISEC Dubai 2020 I am proud to announce I will be delivering a Keynote at GISEC 2020. GISEC 2020 is co-located with... read more
Cyber Security Symposium Africa Erdal Ozkaya

Cyber Security Symposium Africa 2019

Cyber Security Symposium Africa 2019 I am proud to announce, that I will be speaking this year in Africa's most comprehensive... read more
KSA Cloud Summit Erdal Ozkaya

KSA Cloud Summit -2020 Free Online Event

KSA Cloud Summit 2020 Cloud computing has enabled companies to continue operating seamlessly throughout an unprecedented crisis of COVID19 that could... read more
E-Crime and Cybersecurity Congress Erdal Ozkaya

Speaking at E-Crime Congress ( Join us 4 Free)

Speaking at E-Crime Congress I will be speaking at E-Crime Congress London , UK Frankfurt , Germany Dubai , UAE Register now for FREE and... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.