2:17
Rob T. Lee - Federal officials warn of attacks on water utilities
405 views • 1 day ago
5:09
FOR585: Smartphone Forensic Analysis In-Depth course overview
893 views • 1 month ago
4:43
FOR578: Cyber Threat Intelligence Course Overview
1.3K views • 2 months ago
1:03
Why take FOR578 OnDemand? with Robert M. Lee
518 views • 2 months ago
2:17
Rob T. Lee - Could LockBit, ransomware provider have been behind Lurie hack?
815 views • 2 months ago
2:26
Rob T. Lee Chicago's Lurie Children's Hospital RANSOMWARE ATTACK
282 views • 2 months ago
5:47
FOR589: Cybercrime Intelligence Overview
1.4K views • 2 months ago
22:38
FOR528: Ransomware & Cyber Extortion Course Overview
733 views • 3 months ago
1:37:51
Thinking DFIRently From Entry to Specialty
2.2K views • 3 months ago
39:19
How to Leverage Cloud Threat Intelligence Without Drowning: The Zero-Noise Approach
654 views • 3 months ago
38:40
Beyond the Basics: The Role of LLM in Modern Threat Intelligence
2K views • 3 months ago
35:52
Applying Threat Intelligence Practically to Meet the Needs of an Evolving Regulatory Environment
385 views • 3 months ago
35:05
How an Info Sharing Analysis Center Works w/ its Members to Improve Cyber Defenses for Their Sector
275 views • 3 months ago
37:47
Bridging the Intelligence Divide: Building CTI Blueprints for Value-Based Production
315 views • 3 months ago
29:56
How Threat Intelligence Helped Us Defend and Respond to a Nation-State-Sponsored Threat Actor
462 views • 3 months ago
35:03
Clustering Attacker Behavior: Connecting the Dots in the RaaS Ecosystem
1.2K views • 3 months ago
37:52
Threat Intelligence is a Fallacy, but I May be Biased
749 views • 3 months ago
38:13
Deep Dive into Supply Chain Compromise: Hospitality’s Hidden Risks
178 views • 3 months ago
33:08
Beyond Cryptojacking: Studying Contemporary Malware in the Cloud
177 views • 3 months ago
34:38
Why Won’t They Listen? – ConnectingYour CTI to Decision Makers
229 views • 3 months ago
46:57
Cybersecurity is GeoPolitical: Lessons From the Fight Against Mercenary Spyware Proliferation
755 views • 3 months ago
40:39
Intellimation: Guidance for Integrating Automation in Your Cyber Threat Intelligence Program
281 views • 3 months ago
34:27
The Cyber-Hobbit:There and Back Again in CTI
140 views • 3 months ago
37:32
Navigating the Digital Battlefield: A Framework for Geopolitical Cyber Risk Assessment
310 views • 3 months ago
38:20
Sharing Compared: A Study on the Changing Landscape of CTI Networking
205 views • 3 months ago
46:45
Let’s Be Honest About MITRE ATT&CK® Mappings and the “So What”
867 views • 3 months ago
37:10
Zero to CTI: A Novice’s Journey into Threat Intelligence
881 views • 3 months ago
47:09
Revisiting the Indicator: Towards a Threat Intelligence Ontology
706 views • 3 months ago
58:21
OSINTer: Automating the CTI Heavy Lifting the Open Source Way!
1.4K views • 3 months ago
44:25
Slow Cooking and Cyber Threat Intelligence: Cooking a High-Performing Team
518 views • 3 months ago
Load More