Using CTI Against the World's Most Successful Email Scam - CTI SUMMIT 2017
Effective Threat Intel Management - CTI SUMMIT 2017
Knowing When to Consume Intelligence and When to Generate It - CTI SUMMIT 2017
Inglorious Threat Intelligence - SANS CTI Summit 2017
Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017
Reversing Threat Intelligence - Fun with Strings in Malware - CTI SUMMIT 2017
Upgrading Your CTI to Track Down Criminal Hosting Infrastructures - SANS CTI Summit 2018
Integrating Cyber Threat Intelligence using Classic Intel Techniques - CTI SUMMIT 2017
Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence - CTI SUMMIT 2017
ATT&CK™ Your CTI w/ Lessons Learned from 4 Years in the Trenches - SANS CTI Summit 2019
Information Anarchy: A Survival Guide for the Misinformation Age - SANS CTI Summit 2018
Homemade Ramen & Threat Intelligence: A Recipe for Both - SANS CTI Summit 2018
The Challenge of Adversary Intent and Deriving Value Out of It - SANS CTI Summit 2018
Keynote - Journey to the Center of CTI: Story, Systems, and Self
The Threat Intel Victory Garden: Threat Intelligence Using Open Source Tools - CTI SUMMIT 2017
Attributing Active Measures, Then and Now - SANS CTI Summit 2018
SANS DFIR Cyber Threat Intelligence Summit
Wave Your False Flags! Deception Tactics Muddying Attribution - CTI Summit 2017