Pen-To-Paper and The Finished Report: The Key To Generating Threat Intelligence - CTI SUMMIT 2017
Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports
Hack the Reader: Writing Effective Threat Reports with Lenny Zeltser - SANS CTI Summit
Knowing When to Consume Intelligence and When to Generate It - CTI SUMMIT 2017
Analyzing Chinese Information Operations with Threat Intelligence
Cyber Threat Intelligence Report | September 2022 | Payatu
How to Use and Create Threat Intelligence in an Office 365 World - SANS CTI Summit 2019
The Threat Intel Victory Garden: Threat Intelligence Using Open Source Tools - CTI SUMMIT 2017
Why and How to Take the GCTI The Industry’s Cyber Threat Intelligence Certification
Decoding Threat Intelligence
Inglorious Threat Intelligence - SANS CTI Summit 2017
The Circle of HOPE (2018): ATT&CKing with Threat Intelligence
Strategic Takeaways: Forging Compelling Narratives with Cyber Threat Intelligence - SANS CTI Summit
Reversing Threat Intelligence - Fun with Strings in Malware - CTI SUMMIT 2017
From One Sec Guy to the Team that Saved the CISO’s Day | Threat Hunting & Incident Response Summit
Using CTI Against the World's Most Successful Email Scam - CTI SUMMIT 2017
Threat Intelligence Index Report from IBM X-Force
Why you need OT-specific threat intelligence
Legal Implications of Threat Intelligence Sharing - SANS CTI Summit 2018
Truesec Threat Intelligence Report 2021 (The Swedish Cyber Threat Landscape 2020)